Scalable and business-driven product architecture that Teroxx can rely on over the next ten years.
Setup of AWS infrastructure, CI/CD pipeline, and continuous monitoring to guarantee high system performance.
Implementation of preventative security best practices related to the software code, data storage and infrastructure. Among them were:
- Data encryption
- Multi-factor authentication
- Role-based access control
- Protection from different types of attacks, etc.
Unconventional interface design solutions to implement unique features.
Implementation of new features that bring more value for users: e.g. asset distribution diagram, crypto exchange charts, rewards management, new cryptocurrencies availability, etc.