Solutions
DYNAMIST CYBER STATION

Dynamist is an IT service company that delivers efficient solutions focused on secure system architecture, infrastructure as code and automation.

Dynamist strongly believes that the way in which today’s IT systems are built and managed over time needs to change. Simply put, we bridge the gap between system operation and system development with a clear goal, to significantly reduce our customers’ operational costs in a balanced way. We develop code to programmatically define, instantiate and maintain your infrastructure services and security baselines. This leads to faster and more predictable deliveries.

Infrastructure Atlas

Dynamist offers you automation from the ground up. Dynamist Infrastructure Atlas is our own concept where we have gathered our experience of building IT systems with high quality and security requirements. Infrastructure Atlas consists of methodology, architecture and technology that provide secure, manageable and cost-effective IT systems, infrastructures and IT functions.

Infrastructure Atlas consists of modules, methodology and architecture for operating systems and application environments that can run directly on physical hardware, in private or public cloud.

The modules developed handle installation, configuration and are tested continuously. Continuous improvements are introduced through iterative work like the process used in software development. We have learned lessons from these processes and applied them in systems integration and infrastructure.

Dynamist has designed a method for implementing Infrastructure Atlas. The method consists of several parts and different toolboxes and is based on well-proven methods and own experiences.

Methods consist of the following phases:

  • Phase 1 – Requirements
  • Phase 2 – Integration
  • Phase 3 – Hardening
  • Phase 4 – Validation

Contact us

Secure Image

Dynamist offer the customer a functional solution for a secure Image with associated software and services.

Our secure Image is built with a focus on a life cycle perspective, which means that the Image is established and can then be maintained and wound up in the same service. Maintenance and settlement are offered as an option.

To prevent information from being disseminated and thereby risk being disclosed, the Image allows a reset after use of the system has ended. In this case, the reset refers to the Image software package for the intended computer hardware, which is then reset to the state that prevailed at start-up. A correctly performed restoration of Image ensures that any security-classified data and metadata are deleted.

Details on how a restoration of the produced Image can be achieved must thus be prepared in a dialogue between the Client and the Supplier. The starting point is to choose the method that is weighed to be the easiest to implement and implement and which also meets the information security requirements compiled in the curing process according to the requirements specification.

The solution includes a validation that all constituent components such as operating systems, drivers, applications and intended hardware as well as configuration of these interact in a functional solution.

Dynamist offers secure Images on both Linux and Windows .

Contact us