Cyware declares the completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy, as outlined in TSP section 100, (AICPA, Trust Services Criteria).

Anuj Goel, CEO of Cyware commented, “Commitment to the highest levels of data security has always been one of our foremost business priorities. The SOC 2 Type 2 certification process is not easy to achieve but our team was fully committed and prepared to ensure we checked all the required boxes. The new milestone will further strengthen the confidence of our current and future customers in our robust compliance with industry benchmark data security standards including SOC 2 (Type 1 and Type 2) and ISO/IEC 27001:2013.”

This accomplishment shows how dedicated the company is to the highest data security standards. The American Institute of Certified Public Accountants (AICPA) developed SOC 2 as a reporting framework that establishes benchmarks for Software-as-a-Service (SaaS) companies that manage customer and user data. The certification confirms that the organization’s internal systems and controls are in continuous compliance with the SOC 2 audit standards. Schellman & Company, a globally recognized attestation, and compliance services provider performed the audit for Cyware.

Cyware’s clients include some of the world’s largest financial and healthcare organizations, as well as ISAOs and more than 20 sectoral information-sharing communities (ISACs and ISAOs), use Cyware’s solutions to communicate threat intelligence with more than 10,000 member organizations, National CERTs, and Managed Security Service Providers (MSSPs/MDRs). In addition, Cyware recently launched the industry’s first ISAC-to-ISAC Operational Collaboration initiative to remove barriers to cross-sectoral threat sharing. The SOC 2 certification validates the company’s ongoing commitment to earning and retaining customer trust by using security as the foundation for all business operations and product development.

Read more articles:

Netskope Improvised Netskope Private Access