A reliable guide to the world of IT solutions
 
Today our company has more than 100 highly qualified engineers, programmers and fintech analysts with extensive practical experience in development and implementation, as well as in information security. We cooperate with various public and private companies, undergo regular training at the centers of software and IT equipment manufacturers.
Our employees graduated in the field of computer science and information security. The information security team has participated in several hundred successful projects in banking, financial and investment institutions, commercial structures, including: penetration tests, information security level audits, CI leakage and cybercrime investigations, code and mobile application audits, penetration testing as-a-part of PCI DSS audit, information security schemes formation.
About us
At 2018 we implemented the development unit, and today we are one-stop IT service for our clients, providing multidisciplinary IT service.
The company was founded in 2011 and initially specialized in IT infrastructure (technical support and information security).
Joint technology launch of solution with proven track of use for builders
Finance
Engineering/Construction
Integration with scoring model, data enrichment, trading analytics
Education
Contact Centers
Multi-year project development with training materials, internal testing and ranking of participants
Employee’s personal office, request sorting and filtering, automation of routine processes, telephony, CRM
Specialty
Stages of the development process
Testing and deployment
Design and engineering
Development
Audit
Analysts/management holds a series of meetings where we look for an answer to the question of what the software is needed for, what results are expected, who is involved/responsible for the result. Besides the fact that at this stage the foundation for supposed software changes is built, it may turn out that process changes are enough to solve currently complicated problems without any global changes.
Process audit
Independent control over the current level of protection of confidential information, as well as the availability and integrity of information systems. Both from intruders' penetration, and from mistakes of own employees. Including analysis and "highlighting" of negative business habits and established practices.
Security audit
Inventory of systems and equipment, examination of IT infrastructure elements, assessment of possible risks and problematic parts, identification of critical features and "bottlenecks" of application software. We study the documentation on the already implemented / written systems, how prospective / effective their use is). Classification, detailed evaluation of the found problems and identification of methods to solve them.
Audit of the it landscape
Architect develops a solution with the potential for load growth, embedding new logic as input data changes. Describes the Interconnections between microservices, data flow, and business logic.
The designer draws the path of users, both employees and customers and their interaction with the system, transitions, the logic of changing screens and states.
TypeScript, react-hooks, react-router, redux, redux-saga/redux-thunk, Next.js, leaflet (with markercluster & gesture-handling, wms)
Python, FastAPI, SQLAlchemy, Flask, Django PHP, Laravel
Databases: Mysql, postgresql, clickhouse, mongodb, redis.
Backend
Frontend
Our stack
All ideas arriving in the development process are thoroughly worked out by the analyst for the most harmonious implementation in the system. Described and rendered processes allow all participants to understand the purpose of the new functionality. This, combined with the design, also gives the business the opportunity to become familiar with the changes before the developers even start.
In order to make sure that all users of the service understand how to work with changes - among the accompanying documentation there are also user instructions (User Guide and User Manual), by which they will be guided, including new employees. Thanks to this, the implementation process will be as smooth as possible
We have devops, information security specialists on our staff who are involved in the design, thus the project is being implemented under their supervision, so that at the time of deployment and testing by real users there are no incidents, or the response time to them is as short as possible
After completion of development and testing we port the product to the customer's production environment (we can offer our own cloud server, or host it on a server of the customer's choice).
QA is performed by an internal team, which is permanently assigned to the project. QA are maximally involved in the project and can navigate there as well as PM or customer. We do regression, if necessary we can write autotests.
security services
  • Comprehensive information security audit
  • Rapid security assessment
  • Implementation of information protection tools
  • Incident Investigation
  • Information security monitoring
  • Penetration testing
  • Application (mob/web) security audit (mob/web)
  • Employee task monitoring and corporate information leak prevention
  • Load/regression/functional system testing
The Сases
The task is to keep track of trade balances, market quotes and various specific metrics. Its complexity is that the information required by the client for regular analytics is gathered from different exchanges and platforms with different features. We came up with a hybrid use of Rest API and connection via Web Socket to reduce the risk of disabling the trading account on the request limit, as well as in the possibility of decomposition to specific trades in different instruments/currency pairs. This is necessary to control the robots, including the limits set (to avoid automated trading errors, calculation of stop-loss and take-profit levels).
To prevent logical errors and to exercise double control over the strategy, it was decided to completely separate the development directions between the inhouse team, which focuses on the trading tools, and the outsourcer, whose main task is the design and development of the back office.
Management and analysts of AMT, together with the team of MAD SOFT involved, within a few months designed a service to build regular reports, described the process of data movement on the balances of the accounts, made a table to assess the effectiveness of trading strategies.
Swiss Analytical Center - the main activity - aggressive algorithmic trading on spot and derivatives: risk management, automation of financial statements
А strong AML and KYC system is developed and applied when necessary. We want to add fiat deposits and withdrawals, develop a system of special offers for Clients to support them as they test the full potential of our platform.
86M$ of trading volume per day
21k trades daily
Backoffice was also developed, integration with market liquidity was carried out. The platform is fully supported and maintained by our developers and engineers in accordance with current practices of financial institutions
Dependence on the external environment and exchange systems.
Non-functional requirements.
Evolution of architectural constraints.
The entire structure of data storage and their interaction has been implemented in the project. The proposed version of the architecture satisfies the most general requirements of algorithmic trading systems. For such systems, three factors, which act in different combinations in practice, bear the main burden:
CRM system of the operations manager for the analysis of the input requests, validation of the received data and decision making on the allocation of the borrowed funds. Collector's workplace with a list of clients, storage and processing of data, calls and documents. The aggregate of the processed data in the system allows for transparent and complete control over cash flow, performance of various departments and their interaction.
A set of information systems that ensures the processes of financial flows (the process of issuing, servicing and returning loans) and management of interaction with customers. A website and a set of webpages for receiving funding requests; with functionality for testing advertising hypotheses and subsequent analysis of the effectiveness of budget spending;