Fortify is a science-based recovery application that is designed to help individuals struggling with pornography addiction work to recover and have accountability. The platform includes multiple solutions built on top of the same core codebase. The impact collective structure includes Lift - a tool for combating anxiety and depression and Turn, focused on overcoming chemical dependence. The broader ‘Recovery Suite’ for healthcare professionals allows providers and patients to track outcomes through a set of unified HIPAA compliant tools. These powerful education, and community tools empower Fortify users to quit pornography, substance abuse, and overcome depression to move towards a happier and healthier lives.
Our architects and designers work with you to define every feature, screen, and user flow
Receive product builds every two-weeks as we add features
We analyze user feedback to help you prioritize new features
The client approached Zibtek to provide custom software development services to transform its legacy software with a focus on improving the overall flexibility, robustness, and performance of the application. With increased user volume, the firm also needed staff augmentation services to support growing support and QA needs. The firm wanted to update all four web application views, Fortify, Turn, Lift and RecoverySuite. With business growth, their solutions were becoming more complex and the growing codebase required more hands to maintain. They also needed legacy code to be refactored and made into a scalable solution that would serve the growing business needs of their clients.
Problems faced by the client:
Our team executed a comprehensive code audit in parallel with the current development team. The objective was twofold – we wanted to evaluate the defects within the system and the inefficiencies in the software development process. The desired outcome was to materially enhance the performance of Fortify, Turn, Lift and Recovery Suite, improve the consumer experience and allow the application to truly scale. Of note, the interest of enterprise clients also required additional security and testing measures to be put in place to enhance data integrity.
Critical paths executed for improvement and enhancement of the applications:
Ready to start your project?Contact