Mobify Overview

With Mobify, when users visit your site on a mobile device, any data they transmit is as secure as on your current website. This is possible thanks to Mobify’s innovative mobile adaption tools, which use all of the power available on your user’s mobile device to perform the actual transformations required for a full and rich mobile experience.

Once a mobile site has been created with Mobify.js and the related optimization services, the Mobify Tag is placed on your website. This tag points to a small JavaScript bundle that contains instructions for rendering your site for mobile devices.

After the tag has been placed, and your bundle published, your mobile site is active. No further data needs to be sent to Mobify to render your site. When a user visits your site on a mobile device, the tag on your website will request the mobile configuration from our CDN, which instructs the user’s device to render the mobile adaptation.

The Proxy Problem; Added delay and security concerns.

None of your content, or the information your customers send back to you, ever passes through our servers. As a result, Mobify.js may be used in sensitive areas where other mobile solutions, such as proxies, would be legally constrained. Mobify.js allows you to be confident that the security of your mobile users matches that of your desktop users, without any extra effort or cost.

The Mobify Solution: faster load times and inherited security model.


For many in eCommerce, there are security concerns when using a mobile proxy service, since all of their customer's transaction data would pass through their proxy, and jeopardize the security of their customer's data. Mobify recognizes this severe flaw in the proxy model, and has solved it by skipping the proxy altogether.

Thanks to the technology developed at Mobify, any transactional data your users submit goes straight to your server. The same applies to your secure web assets; all traffic goes between you and your client, and nowhere is Mobify required to be an intermediate. This means that your clients will be as secure on your mobile site as they are on a desktop, and that all of the effort you've already made to ensure their security can be carried over onto the mobile web.

Physical Security

Mobify deploys it's services in Rackspace's managed cloud. All data center access is controlled and limited to Rackspace technicians. Biometric scanning and active security monitoring is in place at all data center locations. There is a constant onsite security staff presence to ensure no unauthorized access can occur. Rackspace's physical security is audited by an independent third-party security firm.

System Security

All of Mobify's systems run on hardened and patched platforms behind dedicated firewall and load balancing services to help block unauthorized system access and mitigate the impact of disruptive Distributed Denial of Service (DDoS) attacks. Dedicated intrusion detection components act to further mitigate against unauthorized system access. All of Mobify's systems are redundant, and designed to withstand any failure seamlessly. Frequent tests and simulations are carried out to ensure all failover systems function as expected.

Software Security

Mobify's operations team work around the clock to ensure that our systems, software, and dependencies are up to date, and eliminate any potential vulnerabilities. In addition to Rackspace's monitoring, we also deploy a range of solutions to keep a close eye on all of our resources.

Backups and Disaster Recovery

In addition to full-system backups provided by Rackspace, Mobify maintains independent and offsite backups for all of it's data, in geographically diverse areas.

Employee Access

Owing to Mobify's unique architecture, we do not store any of your data aside from your Mobify layout bundle, which consists of a collection of Javascript directives and a bit of style information to send to your customers when they're on a mobile device. Since the heavy lifting is done on the client end, Mobify never needs to store additional information, and our employees cannot access any of your data.

Last Edited