Solution Briefs

This page contains our solution briefs. The solution briefs are categorized by Business Need, Business Size, and Application Type.

By Business Need

Security by Design

As we know, there are phases in the software development life cycle, i.e. analysis, design, implementation, testing, deployment, and evolution. Security by design leverages phases before deployment as a starting point to do security activities. The sooner we built the security into the software development process, the better we will have the application.

What can we do for your business?

Our Threat Modeling is intended to identify possible threats at design phase. Although it is possible to do Threat Modeling at evolution phase, we recommend to do it at deisgn phase. The sooner we know our threats, the better we can handle them. As a result, we can minimize the probability our application to be compromised. By leveraging available approaches, i.e. software, asset, and attacker based, we can provide a list of possible threats that suit for your application. Our other services, i.e. Security Requirements Identfication, Security Design Review, and Security Test Planning migt be help too.

User Centered Design

There are 4 Ps to reach good results in management, i.e. People, Process, Product, and Partner. This concept is applicable for sofware applications. Your application might has a good process flow, claimed as a reliable product, and only use trusted third-party libraries, but how with the users that will use your application? This is about people. User centered design is needed to complete this puzzle to reach more positive user experience.

What can we do for your business?

Use cases identification is a mandatory activity before we step further. This activity is a part of our Usability Inspection. Your users should meet usability attributes, i.e. effective, efficient, and satisfaction for every identified use cases. This is a vital requirement in order to your application want to be in user centered design process. Our other services, i.e. Information Architecture Analysis, User Persona Development, and Wireframing might be help too.

Usable Security

Usable security is a challenge for security applications. Security applications tend to be technical for most users. As a result, the users might do not know about how to use the applications and might increase the probability for outsider and/or insider to compromise the system. Therefore, usability is a must-have thing for every security applications.

What can we do for your business?

Our Usability Inspection can help you to identify possible usability issues. What we mean with usability issues are those which can reduce effectiveness, efficiency, and satisfaction when using the application. The issues then labelled with High, Medium, or Low as an severity level and suggestions will be provided to make the severity level as Normal. We use Cognitive Walkthrough and Expert Review as main methods and the results are confirmed with Heuristic Evaluation. We also conduct threat modeling in this service, but it is only to identify assets and determine how easy the assets would be compromised by attackers.

Findability

There is no guarantee if your users will find what every their want to seek in your application. The application should be built from perspective of users as part of user centered design. Due to users might have different perspectives, so that findability issues might exist in every application.

What can we do for your business?

Our Information Architecture Analysis is intended to help you to improve findability aspect. By leveraging the benefits of open and closed card sorting, we bring a hybrid card sorting to identify any findability issues in your application. The card sorting will be hosted online and minimum 10 users will take part of this activity.

Competitive Advantage

Many developers have been built the applications to solve needs of users. Users become have many choices. In general, users would seek to the features that they want first, install it if they are interested, but what is the happen next? Users might then uninstalled or choose other application if the installed application is hard to use. So, in order to become competitive in the market, the application shall have usability at acceptable level and shall better from its competitor.

What can we do for your business?

Our Usability Inspection is intended to identify possible usability issues for your application. What we mean with the usability issues are those which compromised effectiveness, efficiency, and satisfaction when using the application. In addition, other our service called Competitive Analysis will identify possible usability issues for your competitor. What we mean with the competitor is those who has most characteristics with your application, either features, typical users, or other characteristics.

Software Quality

We want quality in our life. Software developers also want quality in their softwares. There are 8 characteristics of software quality in ISO/IEC 25010:2011, i.e. functional suitability, performance efficiency, compatibility, usability, reliability, security, maintainability, and portability. We focus on balancing between security and usability. By balancing security and usability, a positive user experience might be easier to reach.

What can we do for your business?

Our Usability Inspection can help you to identify possible usability issues. What we mean with usability issues are those which can reduce effectiveness, efficiency, and satisfaction when using the application. The issues then labelled with High, Medium, or Low as an severity level and suggestions will be provided to make the severity level as Normal. We use Cognitive Walkthrough and Expert Review as main methods and the results are confirmed with Heuristic Evaluation. We also conduct threat modeling in this service, but it is only to identify assets and determine how easy the assets would be compromised by attackers.

Our Threat Modeling is intended to identify possible threats. The more we know our threats, the more we can handle them. As a result, we can minimize the probability our application to be compromised. By leveraging available approaches, i.e. software, asset, and attacker based, we can provide a list of possible threats that suit for your application. We also conduct usability inspection in this service, but it is only to identify possible usability issues for suggested security controls using Heuristic Evaluation.

Software Evolution

Our life is always change every time, either better or worse. So does software. Softwares also change become better or worse. In the end of software development life cycle, there is an evolution phase. In this phase, changes of softwares always happened until the developers end of life their softwares. There are 4 categories for software evolution in ISO/IEC 14764:2006, i.e. corrective, adaptive, perfective, and preventive. Although we focus on analysis and design phases, but our services are applicable at evolution phase too.

What can we do for your business?

For all our services, we provide improvement suggestions. The suggestions might improve for specific findings. We also provide risk levels for each findings. As a result, you will have a prioritization list. For our main services, we provide Plan of Actions and Milestones. Only improvement suggestions do not enough to be considered to what should be completed first. We will provide Plan of Actions and Milestones for you. This contains list of actions and milestones that should be done in time-based. In the end of project, we provide a Follow-Up Service. We provide a follow-up service for 60 days using an online collaboration tool. You could request in order to the follow-up period to be extended in case you are not satisfied with our service, but your request must be considered valid by us. Why we provide a long follow-up period? Because we are proud to be a part of your software evolution! During this time, you might want to consult about how to act as suggested in Plan of Actions and Milestones, how to make better current good condition, or even ask us about our recommendation for next features of your software.

Website Usability

Website is a must-have for every business to be competitive in the market. In general, visitors would seek that they want first in the search engine, open the website if they are interested, but what is the happen next? Visitors might then close it or search for other website if the visited website is hard to use. So, in order to become competitive in the market, the website shall have usability at acceptable level and shall better from its competitor.

What can we do for your business?

Our Usability Inspection is intended to identify possible usability issues. What we mean with the usability issues are those which compromised effectiveness, efficiency, and satisfaction when using your website. Our other services, i.e. Information Architecture Analysis, User Persona Development, and Wireframing might be help too.


Back to Top

By Business Size

Individual Developer

An individual developer is a type of developer that not depends on any organization. He/she works for himself/herself. An individual developer also has a dream to develope a quality software. By facing any delightful and stressful days, he/she can develope as good as software from a software company. An individual developer might also need advice when developing the software. Because of he/she has not a team, he/she would seek an external party to help him/her.

What is our recommendation?

Our Live Consultancy might suit for you. By engaging per hour, you can order as much as hour you need. You will get one-hour session live chat and 10 e-mail session for one month. So, this recommendation is not only efficient for you, but also might be effective to improve your software.

Micro to Small Business

A micro to small business is a type of business with a small team. By all out to keep cash flow stay positive, a micro to small business can develope as good as software from a medium to large software company. A micro to small business might also need advice when developing the software. Because there is a team to develope software, a micro to small business would seek a second opinion from an external party to provide an objective perspective.

What is our recommendation?

Our Consulting Service might suit for you. Our Live Consultancy can be engaged per hour, so that you can order as much as hour you need. You will get one-hour session live chat and 10 e-mail session for one month. If you need to meet us directly, we also provide Face-to-Face Consultancy. Whatever you choose, our recommendation is not only efficient for you, but also might be effective to improve your software.

Medium to Large Business

A medium to large business is a type of business with a large team. By keeping trust of customers stay positive, a medium to large business always improve the quality of developed software. A medium to large business might also need advice when developing the software. Because there is a team to develope software and might be also a team to assure the quality of sofware, a medium to large business would seek a second opinion from an external party to provide an objective perspective.

What is our recommendation?

Our Assessment Service might suit for you. By assessing your software carefully and providing a comprehensive report, you can leverage our experience and expertise to improve your software. Whatever our main service you choose, we will balance security-usability for your software.


Back to Top

By Application Type

Game Application

Games like mushrooms in the rainy season. Many people have dreams to become a game developer. However, nothing is perfect, including the game. Game developers might face any security-usability issues. The developers should act early in analysis and design phases to reduce the efforts to make positive user experience when application has deployed.

Challenges Facing the Game Application Type

Security aspect

As a developer, especially if there is no a quality assurance team, he/she shall still ensure the quality of application, not only usability, performance, and privacy, but also security. The game developer might also need more objective perspective from external party or only as a second opinion to validate the security aspect at analysis and design phases.

We provide a set of security-related services that you can choose. The main service is Threat Modeling to identify possible threats of your application. The add-on services are Security Requirements Identification, Security Design Review, and Security Test Planning.

Aligning the game with the users

The game might played by those who never played the game before or those who play the game to pass the time. Therefore, a game developer shall consider the users well.

We provide Usability Inspection and User Persona Development. By engaging these services, you will have list of actions to make better user experience and better understanding about who from your typical users that will understand the terms that you use.

Structure of game

We might ask ourselves about how many our points at current level or when searching for a specific item. We might need more times to do this and might reduce enjoyment when playing the game.

We provide Information Architecture Analysis and Wireframing to make your game has better findability and layout.

Comprehensive comparison with a competitor

Many games have developed. Developers might do not have enough time to make a survey who is their competitor and a way to make their applications stand out from the competition.

We provide a Competitive Analysis to compare usability aspect with a competitor. By leveraging an external party that has more dedicated time, developers might have better insights about their competitor.

Security Application

Many of us depend on security application to protect our system. However, nothing is perfect, including the security application. Security application developers might face any security-usability issues. The developers should act early in analysis and design phases to reduce the efforts to make positive user experience when application has deployed.

Challenges Facing the Security Application Type

Security aspect

As a developer, especially if there is no a quality assurance team, he/she shall still ensure the quality of application, not only usability, performance, and privacy, but also security. The developer might also need more objective perspective from external party or only as a second opinion to validate the security aspect at analysis and design phases.

We provide a set of security-related services that you can choose. The main service is Threat Modeling to identify possible threats of your application. The add-on services are Security Requirements Identification, Security Design Review, and Security Test Planning.

Technical terms and the impacts

We often meet Encrypt, Decrypt, Quarantine, or SandBox options in security applications. Typically, novice users do not fully understand about these terms. This condition could be worse if developers do not provide enough guidance about the impact if users choose one of these options. As a result, a user might does not use the options.

We provide Usability Inspection and User Persona Development. By engaging these services, you will have list of actions to make better user experience and better understanding about who from your typical users that will understand the terms that you use.

Comprehensive comparison with a competitor

Many security applications have developed. Developers might do not have enough time to make a survey who is their competitor and a way to make their applications stand out from the competition.

We provide a Competitive Analysis to compare usability aspect with a competitor. By leveraging an external party that has more dedicated time, developers might have better insights about their competitors. We also have Information Architecture Analysis and Wireframing to make your application has more competitive advantage.

Privacy Application

Many of us depend on privacy application to boost our system. However, nothing is perfect, including the privacy application. Privacy application developers might face any security-usability issues. The developers should act early in analysis and design phases to reduce the efforts to make positive user experience when application has deployed.

Challenges Facing the Privacy Application Type

Security aspect

As a developer, especially if there is no a quality assurance team, he/she shall still ensure the quality of application, not only usability, performance, and privacy, but also security. The developer might also need more objective perspective from external party or only as a second opinion to validate the security aspect at analysis and design phases.

We provide a set of security-related services that you can choose. The main service is Threat Modeling to identify possible threats of your application. The add-on services are Security Requirements Identification, Security Design Review, and Security Test Planning.

Technical terms and the impacts

We often meet Remove, Delete, and Shred options in privacy applications. Typically, novice users do not fully understand about the difference of these terms. This condition could be worse if developers do not provide enough guidance about the impact if users choose one of these options. As a result, a user might lost his/her important files.

We provide Usability Inspection and User Persona Development. By engaging these services, you will have list of actions to make better user experience and better understanding about who from your typical users that will understand the terms that you use.

Comprehensive comparison with a competitor

Many privacy applications have developed. Developers might do not have enough time to make a survey who is their competitor and a way to make their applications stand out from the competition.

We provide a Competitive Analysis to compare usability aspect with a competitor. By leveraging an external party that has more dedicated time, developers might have better insights about their competitors. We also have Information Architecture Analysis and Wireframing to make your application has more competitive advantage.

Learning Application

Mobile and internet technologies have changed the behaviour of users to learn something. They can learn many things from learning applications. However, nothing is perfect, including the learning applications. Learning applications developers might face any security-usability issues. The developers should act early in analysis and design phases to reduce the efforts to make positive user experience when application has deployed.

Challenges Facing the Security Application Type

Security aspect

As a developer, especially if there is no a quality assurance team, he/she shall still ensure the quality of application, not only usability, performance, and privacy, but also security. The developer might also need more objective perspective from external party or only as a second opinion to validate the security aspect at analysis and design phases.

We provide a set of security-related services that you can choose. The main service is Threat Modeling to identify possible threats of your application. The add-on services are Security Requirements Identification, Security Design Review, and Security Test Planning.

Aligning with the users

For example, learning application for foreign language, we often input the correct answer, but it is rejected by the application. The reason is maybe our answer is in informal form or there is a typo. This might increase the stress level. Therefore, a developer shall consider the users well.

We provide Usability Inspection and User Persona Development. By engaging these services, you will have list of actions to make better user experience and better understanding about your typical users.

Comprehensive comparison with a competitor

Many learning applications have developed. Developers might do not have enough time to make a survey who is their competitor and a way to make their applications stand out from the competition.

We provide a Competitive Analysis to compare usability aspect with a competitor. By leveraging an external party that has more dedicated time, developers might have better insights about their competitors. We also have Information Architecture Analysis and Wireframing to make your application has more competitive advantage.


Back to Top