Past Performance

Microsoft Azure Migration

MDS migrated over 700 applications to Microsoft Azure for a highly regulated platform. This government client, with over 7,000 users, needed to develop an enhanced cloud strategy and executed it properly.  They needed to migrate their server workloads from an on-premise data center. The datacenter was running virtualized servers attached to centralized SANs and the storage and virtual infrastructure. The goal was to update and reduce their data center footprint. They required to leverage Azure to modernize their applications and did not have the dedicated resources to do this. Having many different databases was causing complications and extensive to remediate. MDS developed a custom Cloud Adoption Framework (CAF) within Microsoft Azure. Each application was modernized during the migration and rehost on either platform services or new Windows server operating systems. MDS also put together multiple technology teams to handle discovery, refactoring, and rebuilding of their many apps. All of these teams working simultaneously with apps that have SQL Database and were migrated to SQL PaaS. At the end of the project, MDS was able to successfully migrate over 700 applications to Microsoft Azure without interfering the mission of the client.

  • Contact Phone: Provided upon request

MDS deployed a full 24/7/365 professional services & staffing needs program with Monitoring Managed Service

MDS implemented Cybersecurity Services and Solutions offering and Cybersecurity Roadmap. MDS designed, implemented, and integrated our yearly federal security advisory service as well as security operational management systems.

  • A Security Program Strategy to align information security policy and strategy with their initiatives.
  • Threat and Vulnerability Management to uncover and remediate flaws and vulnerabilities in their security systems.
  • Risk and Compliance to better understand risk through an IT risk assessment and make informed decisions about how to manage it.
  • Security Architecture, Governance, and Implementation to help make decisions about the right technology, architecture, and projects to ensure network security standards we being met.
  • Incident Management to improve response to unauthorized intrusion attacks.
  • Identity and Access Management (IAM) to design, implement, and test IAM systems that better enable business processes.
  • Data security and governance to protect critical information.
  • Cybersecurity Awareness to develop behavior that can improve security and reduce risk.
  • Managed Security Services that provided compliant security solutions.
With the MDS Security proprietary security offerings that work with the deployment of Azure Sentinel, MDS was able to help stop cyberthreats, identify points of failure in existing systems, close pathways of attack, remediate vulnerabilities to reduce risk, and meet compliance requirements.

  • Contact Phone: Provided upon request

MDS implemented a Microsoft security strategy for highly regulated division of the DoD

With Microsoft 365 implemented in a multi-cloud environment, MDS deployed a proprietary cloud solution. These technologies replaced their legacy software while elevating their security posture. This gave MDS the ability to successfully patch and manage over 9,000 endpoints which allowed for a secure remote work setting. This engagement was conducted following MDS methodology concept of operations.

  • Contact Phone: Provided upon request

MDS developed and deployed for 3,000 users a collaborative and secure environment

MDS developed a technology implementation plan to resolve and upgrade collaboration while consolidating the number of vendors in half. MDS Unified and integrated security controls that enable the customer for advance conditional access and threat response.

The solution included:

  • Microsoft Teams migration and rollout.
  • E5 Security & Compliance tools that met the compliance standards through Microsoft guided tasks. Technologies include:
    • Identity & Access Management
    • Cloud Security
    • Data security & governance
    • Endpoint security
    • Threat Hunting
    • Network & AD Security
    • Device security & management

  • Contact Phone: Provided upon request