Fairfax, VA – October 16, 2019 – Pyramid Systems, a women-owned small business providing Modernization, DevSecOps, Cloud, Analytics, and Biometric services to the federal government, is pleased to announce the launch of its newly redesigned website at www. pyramidsystems.com. The new website features a modern design, an engaging user experience, and more content about emerging technologies, Pyramid’s…
Read MoreSeptember 26, 2019 — Pyramid Systems, a women-owned small business providing technology solutions to the federal government, is excited to announce that Chris Bishop has joined the company as its Chief Growth Officer. Bishop, a recognized industry growth and tech leader, will develop and implement Pyramid’s organic and inorganic growth strategy by aligning business methods, capabilities, and technologies with federal budgets and Pyramid’s pipeline. In this role, Bishop will lead the company’s strategic planning, business development, proposal, and marketing activities.
Read MoreSeptember 10, 2019 – Pyramid Systems is proud to announce the successful recertification of our International Organization for Standardization (ISO) 20000-1 and ISO 27001 accreditations.
Read MoreOur client conducts hundreds of audits each month and needed a solution to support the secure transfer of Personally Identifiable Information (PII) and other sensitive financial data in the cloud. Our agile team developed a working prototype in just eight days, saving the client millions. The solution was named by the agency as one of its top “2018 Innovations in Action.” Learn why…
Read MoreAugust 26, 2019 – The Washington Business Journal has honored Pyramid Systems’ President and Co-founder, Sherry Hwang, with its 2019 “Women Who Mean Business Award.”
Read MoreThere are two types of applications: those that have moved to the cloud and those that have yet to move to the cloud. Bold claim? We don’t think so. In this article, we will look at how to protect your cloud-based information, some of the approaches available for doing so, and three scenarios demonstrating the securing of sensitive data stored in the cloud.
Read MoreTechnology processes are changing just as rapidly as technology itself. The benefits of a DevSecOps model are overwhelming and undeniable. So, how should agencies begin their journey to DevSecOps? This white paper lays out the milestones to reach for new and early adopters of DevSecOps.
Read MoreOur client conducted numerous analysis pertaining to our economy via a legacy database that generated canned Statistical Analysis System (SAS) reports, which were satisfactory for basic users, but problematic for power users. We transformed the database’s capabilities, enhanced user experience, and broadened reporting capabilities so now the data is easier to access and share, improving our client operations. Learn how…
Read MoreWe’re compelled to share agile-based contracting strategies that can help contracting professionals achieve optimal results faster with technology solution procurements. Let’s start the conversation at the intersection between traditional and agile approaches, then share some tips for integrating agile principles and practices into our contracting process while remaining compliant.
Read MoreOur client used a decade-old system to perform thousands of audits to ensure our country’s economic health. The legacy tool was struggling to keep pace with the increasing volume of audits and the needs of auditors in the field. Pyramid delivered an innovative, mission-critical, and user-friendly application that speeds up the auditing process and significantly increases data security. Learn how…
Read More