Reaching Benchmark for Security Compliance
We are excited to announce that SOC Prime has successfully completed the Service Organization Control (SOC) 2 Type I auditing procedure. The audit has been conducted by the industry-leading CPA firm, I.S. Partners, LLC, one of the Qualified Security Assessor (QSA) organizations certified by the PCI Council. The examination was carried out in line with attestation standards established by the American Institute of Certified Public Accountants (AICPA).
Organizations daring to supercharge their threat detection capabilities rely on third-party SaaS vendors that can supply use-case threat-specific content neatly matching the company’s security needs. The core SOC Prime’s product, Threat Detection Marketplace (TDM), is a SaaS platform providing free and premium content and threat detection algorithms from a plethora of sources that organizations apply to their threat-management strategies extended from SIEM, EDR and NSM solutions. Trust and transparency are indispensable when it comes to the security operations, processes, and procedures the companies seek to obtain from their partnership with SOC Prime. SOC Prime establishes operational requirements that support the achievement of security commitments, relevant laws and regulations, and other system requirements communicated in the company’s system policies and procedures, system design documentation, and contracts with clients. SOC 2® compliance is a key concern for companies that are looking for reliable SaaS product vendors.
The SOC 2® auditor’s report verifies that SOC Prime’s service organization’s system fully complies with the requirements set forth in 2018 Description Criteria for a Description of a Service Organization’s System in a SOC 2® Type I Report. SOC 2® compliance ensures that SOC Prime’s information security practices, policies, operations, and procedures meet the relevant standards for secure data management and emphasize the company’s commitment to high standards of excellence for the protection of information assets and information technology resources.
SOC 2 Type I Compliance
SOC Prime applies best practices for maintaining network security deploying the latest technologies against cyber attacks. We are GDPR compliant and dedicated to protecting the privacy of customer data. Security commitments to user entities are documented and communicated in SLAs and other client agreements.
SOC Prime establishes operational requirements that support the accomplishment of security commitments, relevant laws and regulations, and other system requirements. Information security policies define an organization-wide approach to how systems and data are protected to be fully compliant with the SOC 2 Type I requirements.