
Container Signing with AWS Signer
This project for a Fortune 500 company strengthened the security of deployed applications by implementing notarization for container artifacts, that can be used to established a chain of trust.
As a biotechnology company on the cutting edge of MRNA therapeutics, our customer needs detailed and low-latency data on COVID-19 cases and vaccination rates from health departments and organizations around the world in order to monitor the distribution and efficacy of their vaccines and to understand the spread and evolution of the virus.
Rearc worked with the Biotech company's Data Engineering leadership and stakeholders from their DSAI team to gather requirements and understand the scope of data needed.
To develop the needed data products, Rearc expanded its data platform with sophisticated parsers, enabling the extraction of tabular data from PDF and ODS files supplied by health agencies.
Rearc used AWS Data Exchange with Redshift Data Sharing to deliver this data to the customer, enabling seamless ingestion of datasets into their Redshift Data Warehouse.
Read more about the latest and greatest work Rearc has been up to.
This project for a Fortune 500 company strengthened the security of deployed applications by implementing notarization for container artifacts, that can be used to established a chain of trust.
This project for a Fortune 500 company strengthened the security of deployed applications by implementing automated cryptographic cipher scanning, analysis, and reporting, ensuring security compliance while maintaining development velocity.
Rearc performed an application portfolio assessment and designed a migration strategy for Avesis as they moved to a new AWS Organization. Post planning, Rearc leveraged infrastructure as code to deliver a new cloud landing zone in AWS and created an account factory for future growth. Rearc integrated Avesis's new AWS environment with their new Azure environment.
This project for a Fortune 500 company strengthened the security of Databricks-integrated data lake pipelines by implementing automated vulnerability detection, secure credential management, and third-party dependency scanning, resulting in a compliant and resilient infrastructure.
Tell us more about your custom needs.
We’ll get back to you, really fast
Kick-off meeting