• Services

    What we have to offer

The principal strengths of hma consulting Value-Added Services are:

  • Teams amassed to fit the purpose, as compared with clearing the bench
  • Consulting services at two thirds the price of traditional firms
  • Professional consultants leading project teams supported by disciplined processes to manage both delivery and execution

We offer clients a vast list of services which help organizations expand, strengthen and or transition to new environments quickly and efficiently.


  • Application architecture
  • Application development
  • Application management
  • Business analysis
  • Business intelligence
  • Big Data
  • Business process improvement
  • Cloud computing
  • Customer relationship management (CRM)
  • Data architecture
  • Data governance quality
  • Data warehousing
  • EDI
  • Enterprise analytics and reporting
  • Enterprise resource planning (ERP)
    • SAP, PeopleSoft, Oracle EBS, Siebel, Salesforce.com, workday
  • Information architecture
  • Information management
  • Integration management and middleware development
  • IT project management
  • Mobility
  • QA and software testing
  • System design
  • Web/e-commerce

Network and Infrastructure

  • Cloud computing
  • Data center
    • Administration
    • Server and storage architecture
    • Engineering
  • IT Service Management and ITIL®
  • Network infrastructure
    • Administration
    • Engineering
    • LAN/WAN network
    • Voice
    • Network operations center (NOC)
  • Project management
  • Business analysts
  • Coordinators
  • Managers

Information Security

Information Security is broken down into the following three facets:

Governance, Risk and Compliance (GRC)

  • What controls framework(s) will be most effective (governance)
  • Where the threat and vulnerabilities lay within their systems (risk)
  • What compliance standards each company must abide by (compliance)

Identity and Access Management (IAM)

The central concept of IAM revolves around controlling who has access to what information (and what is being done with that information) within a company’s hierarchy. The most common method for determining such is based on employee credentials. That is, an employee’s rank within a company dictates what level of access they have to information. Furthermore, IAM now places a lot of emphasis on how information is handled (I.e. what is being transferred and how).

Threat and Vulnerability Management (TVM)

The presence of a threat plus the existence of a vulnerability generates risk. 

  • Security Directors
  • Ethical Hackers
  • ISOs
  • IT Risk and Compliance Managers
  • Risk Management Architects
  • Information Security Project Managers
  • Security Architects
  • Security Engineers
  • Security Administrators
  • PKI Engineers
  • SOC Analysts
  • Info Sec Analysts
  • IT Auditors, etc.