We at Mobius follow the Agile mode of product development wherein deliverables are released in patches and continuously integrated to meet both business demands and security agreement. Our DevOps maintain industry level development and security methodologies to mitigate any functional issues and vulnerabilities.
24x7x365 video surveillance: Mobius office is under 24x7x365 video monitoring both at premises level and floor level to ensure only authorized individuals should access the building and the office.
2-factor biometric authentication: Only authorized personnel can enter Mobius workstation. Smart card readers and security guards are present both at the premise and floor level which makes it impossible for any unauthorized person to enter. Significant locations like server rooms are accessible only to authorized individuals.
Visitor policy: Visitor policies are adhered rigidly by all our employees. Our security guards are intimated in advance about any visitors and a proper letter has to be produced for them to enter the office. Any visitor is always accompanied by our employee both inside the building and the office.
Business continuity: All the data and applications are hosted in industry-leading Amazon Web Services, whose data centers have been thoroughly tested for security, availability, and business continuity. We have round the clock power supply. Furthermore, alternate power systems are also installed to maintain business continuity.
Safety Measures: Water sprinklers, fire extinguishers, and fire alarms are placed at regular intervals to detect and reduce damages in the event of any natural disasters like fire and earthquake. Regular drills are conducted for employee awareness on the evacuation procedures.
Our network is well updated with the latest version of firewalls and antivirus software to protect all internal and external communications, to detect and alert any intrusions in case of any threat. A multi-factor authentication is always required to access any production systems. Logs are maintained and reviewed periodically to mitigate any incident. The NOC and SOC teams monitor the infrastructure 24x7 for stability, intrusions, and spam using a dedicated alert system. Our in-house IT team perform vulnerability tests and penetration tests every 90days. All the data transmission is done through Transport Layer Security (TLS) and Hyper Text Transfer Protocol Secure (HTTPS). We make sure no sensitive data values are stored in clear text.
Data Retention and Deletion
Customer Data Access
Our technical experts have access to sensitive customer data for effective development of the application. Access to customer data is provided over two-factor authentication and stored in VPN using a public key. All access is logged and no unauthorized person is allowed to obtain the customer data.