Reaching Benchmark for Security Compliance
We are excited to announce that SOC Prime has successfully completed the Service Organization Control (SOC) 2 Type II auditing procedure. The audit has been conducted by the industry-leading CPA firm, I.S. Partners, LLC, one of the Qualified Security Assessor (QSA) organizations certified by the PCI Council. The examination was carried out in line with attestation standards established by the American Institute of Certified Public Accountants (AICPA).
Organizations daring to supercharge their cyber defense capabilities rely on third-party vendors that can supply threat detection content neatly matching the company’s security needs. Powered by its Detection as Code platform, SOC Prime curates the most up-to-date Sigma-based threat detection content from over 300 researchers and natively delivers it via subscription to 20+ SIEM and XDR platforms to more than 6,000 enterprises, governments, and MDRs worldwide. Trust, transparency, and privacy are indispensable when it comes to the security operations, processes, and procedures the companies seek to obtain from their partnership with SOC Prime. SOC Prime establishes operational requirements that support the achievement of security commitments, relevant laws and regulations, and other system requirements communicated in the company’s system policies and procedures, system design documentation, and contracts with clients. SOC 2® compliance is a key concern for companies that are looking for reliable cybersecurity partners and vendors.
The SOC 2 Type II auditor’s report verifies that SOC Prime’s service commitments and system requirements have been achieved based on the trust services criteria relevant to security set forth in 2018 Description Criteria for a Description of a Service Organization’s System in a SOC 2® Report.
SOC 2® compliance ensures that SOC Prime’s information security practices, policies, operations, and procedures meet the relevant requirements for secure data management and emphasize the company’s commitment to high standards of excellence for the protection of information assets and information technology resources.
SOC 2 Type II Compliance
SOC Prime applies best practices for maintaining full-scale information security protection, deploying the latest technologies against cyber-attacks and implementing the privacy imperative across all company's products and services. As a GDPR-compliant organization, we are dedicated to protecting the privacy of customer data. In line with GDPR regulations, SOC Prime’s Detection as Code platform is designed to protect your data and privacy. All our projects are run by the in-house SOC Prime Team and all the data is encrypted at rest by the industry-standard AES-256 algorithm.
Security commitments to user entities are documented and communicated in SLAs and other client agreements. SOC Prime establishes operational requirements that support the accomplishment of security commitments, relevant laws and regulations, and other system requirements. Information security policies define an organization-wide approach to how systems and data are protected to be fully compliant with the SOC 2 Type II requirements.