Highly Resilient Architecture

Our portal hosting partner is AWS and our servers are hosted in world class AWS data centers around the world, that is protected by biometric locks and 24-hour surveillance. We ensure that our application is always up to date with the latest security patches.


Component Redundancy

All components are deployed in ‘n+1’ mode across multiple availability zones configured in active - active mode behind a load balancing service.

Highly Scalable DNS

Route users to the best endpoint based on geo-proximity, latency, health, and other considerations.

Platform Load Balancing

Automatically distribute application traffic across multiple availability zones that supports high availability, auto scaling and robust security.

Data Backup

Near real-time backups taken across multiple availability zones in encrypted and access controlled containers.

Cross Geo Redundancy

Mirrored multiple Availability Zones are setup and serves customers in real-time thereby providing seamless DR capability.

Incident & Breach Management

Procedures are established for reporting incidents, and tracking it for timely communication, investigation and resolution.

Content Distribution Network

Geographically distributed network of proxy servers and their data centers. The goal is to distribute service spatially relative to end-users to provide high availability and high performance.

Security Operations

Situation awareness through the detection, containment, and remediation of any suspected or actual security incidents. Tactical rules and data sensors are configured to provide suitable early warnings and alerts.

Capacity Management

Proactive capacity monitoring based on conservative thresholds and on-demand capacity expansion capability through our highly elastic hosting partners.

AWS Integrated

PowerCloud Edges automatically authenticate, connect, and receive configuration instructions once they are connected to the Internet in a zero-touch deployment. PowerCloud integrates with the existing network and users benefit from dynamic learning and automation.

Protecting Your Data

We understand the value of data. With our robust system of data safeguards, we allow you to focus on your data rather than on its security.


Virtual Private Cloud

Hosted in dedicated VPCs in non-promiscuous mode that are further segmented for increased security and manageability.

Perimeter Security

Routing rules hardened based on pre-established criteria for various permissible transactions across all resources.

Access Controls

Role-based access through IAM that enforces segregation of duties, two-factor authentication and end-to-end audit trails ensuring access is in accordance with security context.


AES 256 bit encryption with 1,024 bit key-strength for data at Rest and FIPS 140-2 compliant TLS encryption for data in transit.

Management Plane

Secure administrative tunnel with whitelisted IP addresses for secure connection to the servers for administrative purposes, through a bastion host.

Malware & Spam Protection

Malware and Spam protection applied based on latest threat signatures and supports real-time scanning and security.