Simple Lovely Email

“Simple and Beautiful email marketing” — Mashable

Security Information PCI-compliant payment processing, data security, server redundancy and dependency.

Secure design principles

Mad Mimi's data architecture is subjected to frequent design reviews while all sensitive areas of our infrastructure undergo audits by carefully selected industry experts. Access to Mad Mimi's data is limited to a select number of senior personnel, giving the customer reasonable assurance that unauthorized access to their data is impossible. Mad Mimi utilizes a hybrid of dedicated and cloud computing systems, all of which occupy SAS-70-Certified data-centers.

Sophisticated physical security.

The state-of-the-art servers that power Mad Mimi are strictly controlled by biometric hand scanner-access points of entry, armed, round-the-clock interior and exterior surveillance security personnel, making chances of unauthorized physical security breaches improbable.

Data-loss risk-management and backups

Mad Mimi utilizes both replication and network backups to ensure both redundancy and recovery from possible failure. Mad Mimi keeps consistent up-to-the-second replications of data for immediate failover protection, and performs nightly live backups of all data in case of replication failure.

Regularly-updated infrastructure.

Our software infrastructure is updated regularly with the latest security patches. Mad Mimi runs on a dedicated network which is locked down with the highest-grade Cisco industrial firewalls and is carefully monitored. While flawless security is something of an elusive end, we go above and beyond in providing impeccable security to our customers.

Redundancy for all crucial systems.

Our servers - from image serving to click-tracking are engineered to stay up even if multiple servers fail. With the use of share-nothing web servers, cloud-based content distribution networks and a state-of-the-art replicating database architecture, each piece of Mad Mimi is largely independent and distributed. Risk management includes the use of deployment and configuration management systems that benefit the system with the ability to commission new hardware immediately.

We protect your billing information.

All credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network.