Designed to be secure & agile

Designed for reliability, scalability and agility that matched the speed of your organization's growth, and that protects you from even the most sophisticated cyber-attacks.

Trusted across the globe

99.99% uptime

between 2017 & 2021

900+ containers

in production, 9000+ containers on peak load

> 50 TB

of data analyzed every month for anomalies

MockWin secure by design approach

Predictive-first approach for security systems

Robust Architecture

Robust Architecture

Independently deployable and scalable with microservices

  • Zero Trust Network Architecture using AWS
  • Leverages multi availability zones and multi-region architecture of AWS
Security & Privacy

Security & Privacy

Encryption by default for data in rest and transfer

  • ML applied to capture unhealthy traffic and block it at WAF layer
  • Logical separation of data with separate web containers for each customer
  • Data Masking and encryption keys used for every customer in application logic
Risk Mitigation

Risk Mitigation

Secure cloud workloads, data, apps, and access from threats

  • Monitor devices and fix issues remotely
  • Capture Point-in-time backups
  • Identify internal threats with inappropriate user behaviour
  • Ensure business continuity with pro-active release management
Data Localization

Data Localization

Out-of-the box data residency in unified instance

  • Data residency of cross-country legal entities
  • Minimum configurations to select PII fields for country specific requirements

Compliance & Regulatory

ISO 27001

Globally recognized, standards-based approach to security that outlines requirements for an organization's Information Security Management System (ISMS).

ISO 27701:2019

This standard provides the requirements and guidelines for the implementation and continuous improvement of an organization's Privacy Information Management System (PIMS).

ISO 9001:2015

Requirements for a quality management system when an organization needs to consistently provide products and services that meet customer and applicable statutory requirements.

SOC 1 Type 2

SOC 1 Type 2 compliance involves an in-depth audit of an organization's internal controls over financial reporting over a specified period.

SOC 2 Type 2

SOC 2 Type 2 compliance involves auditing an organization's controls over security, availability, processing integrity, confidentiality, and privacy.

CCPA

CCPA compliance mandates that organizations protect the data privacy rights of California residents with transparency in data collection and usage.

GDPR

The General Data Protection Regulation imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU.

CERT-IN

All audits and VAPT assessments are performed by Cert-IN empanelled auditors