Over the years, a broad range of different IT structures have emerged for the implementation of various administrative processes. It is becoming increasingly expensive and laborious to maintain these structures. IT consolidation brings with it the need and thus also the opportunity to harmonise the number of systems and processes.
Administrative processes offer support for day-to-day administrative tasks. These tasks are complex and specific to the relevant departments, which means they can only be carried out efficiently by using digital systems.
For many years, adesso has been developing administrative systems for clients at all levels within public authorities. Professional project managers and perfected procedure models facilitate the implementation of these complex projects. We support you with every phase of your projects – including the requirement specification and the design, development, testing and rollout stages – to ensure that they are successful. Our project managers, who have the crucial skills for the task, can make sure that even large, complex projects are implemented successfully.
Governmental administrative processes have usually evolved and been subjected to constant adaptations over the years. This is often detrimental to their stability and traceability, which in turn affects their long-term viability.
Some of these applications require improvements regarding their operating efficiency.
Our experts migrate these applications to a target architecture that best suits the requirements/applications. There are various different migration scenarios for this process. Our experts also have extensive project experience, so they can ensure that the process of migrating to the new architecture is efficient. The source architecture is less important in this process because our expertise includes working with mainframe, Microsoft and Java environments.
Application security is an elementary topic for adesso, which has gained importance not least due to the European legislation on data protection (GDPR / DSGVO). In this context, we offer solutions from a single source that do justice to this importance and meet the technical and legal requirements.
Our certified security experts develop your specialist applications taking into account possible risks as well as legal requirements and standards - such as BSI basic protection. We pursue a comprehensive and secure software development process, starting with a threat and requirements analysis.
The relevant measures are tested for design and source code weaknesses during and after implementation. The verification is performed with the help of tools, manual controls and - if necessary - internal or external penetration tests. Our experts accompany you during the go live of the software and coordinate already identified infrastructure measures - such as hardening an operating system or setting up additional firewall rules - with the operator.