Ekyam’s platform is built on Google Cloud Platform (GCP), and Microsoft Azure, both of which provide robust security-controls and mandate compliance with the industry standards. This ensures a scalable, and robust hosting for our services.
On GCP, Ekyam leverages a secure, scalable containerization through Google Kubernetes Engine (GKE) for deploying workloads. On Azure, Ekyam uses Azure Kubernetes Service (AKS) to ensure secure orchestration and workload isolation across environments.
Security is Ekyam’s priority and one of the Core Components of our security posture is robust Network Isolation.
Network Segmentation and Isolation uses Virtual Private Clouds in GCP and Azure for each environment (Development, Staging, and Production). Ekyam deploys Firewall Policies to restrict access control based on the Principle of Least Privilege, ensuring that only approved users can access the sensitive resources and prevent data from getting unauthorized access. Moreover, we have several systems deployed across multiple availability zones to ensure they can be accessed securely with authorized VPN access only. We have automated scaling and health checks to ensure that the system is able to recover from the failures.
Ekyam monitors, evaluates and strengthens its cloud security infrastructure through the best practices suggested by GCP and Azure to ensure that the customer’s data remains secure without impacting the operations.