Skip to main content
Security & Compliance

Security runs through
everything we do.

We've been building healthcare software since 2003 — exclusively. That means 23+ years of navigating HIPAA, state privacy laws, and the compliance requirements specific to each client's market, with a dedicated CISO on the program and a clean breach record throughout.

0Reported breaches
23+Years in healthcare
Certifications & compliance
HIPAA CompliantSOC 2 Type 1NIST CSF 2.0AWS Partner

How we approach security

Four disciplines, running concurrently across every production application.

Each of these disciplines is active in parallel and depend on one another. A gap in any one of them creates exposure in all of them.

Hosting & infrastructure

HIPAA-compliant AWS infrastructure with PHI encryption at rest and in transit, private network architecture, and a BAA on every engagement.

Active cybersecurity

Automated penetration testing, static code analysis, web application firewall, and continuous threat intelligence running against every production application.

Authentication (MWE Auth)

HIPAA-compliant authentication platform supporting SSO, SAML, OAuth 2.0, and OpenID Connect — built in-house and maintained as a living product.

Maintenance & compliance upkeep

We hold the compliance posture for the life of the build — not just through launch. Regulations update. Dependencies age. We stay current so you don't have to.

Security leadership

Pablo Bullian, CISO at Medical Web Experts

Pablo Bullian

CISO — MWE since 2017

The person accountable
for your data.

Pablo has led security at MWE since 2017, first as Security & Infrastructure Manager, then as CISO. His work is exclusively focused on healthcare — HIPAA, U.S. patient data, and the PHI systems that require it.

He also directs the Cybersecurity Engineering program at one of Europe's leading engineering schools, where he designs curriculum and teaches web, systems, and cloud security, including classical and post-quantum cryptography.

RoleChief Information Security Officer, MWE
With MWESince 2017 — U.S. healthcare-exclusive
AcademicCybersecurity Engineering program — CPE Lyon
EducationM.S. Cybersecurity, University of Buenos Aires
CertificationsCISSP · AWS Educator · CCNA · CIPP/E
FrameworksHIPAA · GDPR · SOC 2 · ISO 27001 · PCI DSS · NIST · OWASP

How we apply compliance

A compliant server running a non-compliant workflow is still a liability.

We assess compliance at both levels — infrastructure and application — because most violations don't originate in the server room. They originate in the code.

At the infrastructure level

HIPAA-compliant AWS architecture with encryption at rest and in transit, private network design, database environment isolation, continuous monitoring, and a Business Associate Agreement on every engagement — before a line of code is written.

At the application level

Compliance is evaluated per feature and per workflow change. Our security program flags application-level concerns — not just infrastructure ones — at each stage of development and deployment.

Active cybersecurity

Tested continuously. Not just at launch.

Automated tooling and specialist review run against every production application on an ongoing basis — not scoped to a launch window.

Detection

Automated penetration testing

Dynamic testing of applications and APIs against modern attack techniques — integrated into the CI/CD pipeline so every release is tested before it reaches production.

Prevention

Static application security testing

AI-powered source code analysis scanning for unsafe methods, outdated dependencies, and known vulnerability patterns before code ships.

Protection

Web application firewall

Real-time monitoring and filtering of HTTP traffic — guards against SQL injection, cross-site scripting, CSRF, and other application-layer attacks.

Intelligence

Threat intelligence & alerting

Our SOC monitors emerging vulnerabilities continuously. Organizations are alerted to threats relevant to their specific technology stack — not generic advisories.

Recovery

Priority disaster recovery

Advanced Cybersecurity Package clients are prioritized in the recovery queue during regional outages, reducing downtime exposure during worst-case scenarios.

Response

Targeted threat mitigation

Attack-specific mitigation, data integrity monitoring, and retrospective reporting — so you understand exactly what happened and how it was resolved.

Maintenance & compliance upkeep

A healthcare application that was compliant at launch can drift — and usually does.

Regulations update. Dependencies age. Vulnerabilities get disclosed. Ongoing maintenance is what keeps your security posture current over time.

Proactive

We monitor scalability issues and dependency risk across supported applications, flagging recommendations before problems surface — not after.

Corrective

Bugs on supported platforms are addressed as part of the ongoing maintenance relationship, not invoiced as separate line items.

Adaptive

When HIPAA, ADA, or CCPA guidance updates, we analyze your obligations and propose solutions — so you're not caught off-guard by regulatory shifts.

Dependencies & patches

Dependencies are updated as part of the maintenance cycle. Security patches and OS-level zero-day fixes are included.

6+ Years

Average client partnership

The people who maintain your application understand it at a level that's hard to replicate elsewhere. They know the architecture decisions, the edge cases, and the history behind every workflow.

Compliance coverage

We work to the regulations your organization is accountable to.

HIPAA and HITECH are the baseline for every engagement. Additional obligations — state privacy laws, international frameworks, product-type requirements — are advised on and built to as they apply.

United States & Americas

  • HIPAA · HITECH
  • CCPA / CPRA
  • ADA / WCAG
  • SOC 2
  • NIST CSF 2.0
  • 42 CFR Part 2
  • PIPEDA
  • LGPD (Brazil)

International

  • GDPR
  • PDPL (Saudi Arabia)
  • APPI (Japan)
  • Privacy Act (AU / NZ)
  • PDPA (Singapore)

Related services

We host what we build. We can also host what we didn't.

App rescue & stabilization

Inherited applications that concern you

We assess, stabilize, and take long-term ownership of applications not originally built by MWE — whether AI-generated, externally developed, or inherited through acquisition. Start with a compliance posture assessment.

MWE Auth

Authentication you don't have to own

HIPAA-compliant authentication platform providing user management, SSO, two-factor authentication, and access control — running in production and available to select external partners.

Tell us what
you're working on.

Most good projects start with a conversation. If you have materials — requirements, diagrams, vendor documents, notes — send them over. We'll review them before we talk.