CIO Influence
CIO Influence News Cloud Security

Ordr Successfully Achieves SOC 2 Type 2 Compliance

Ordr Successfully Achieves SOC 2 Type 2 Compliance
Leader in Connected Device Security Meets AICPA Strict Standards on SOC 2 Type 2 Compliance for Keeping Customer Data Secure

Ordr, the leader in connected device security, announced that the company has successfully completed the System and Organization Controls (SOC) 2 audit for the Ordr Systems Control Engine. Developed by the American institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data in accordance with five key service principles: security, availability, processing integrity, confidentiality, and privacy. Ordr’s SOC 2 certification demonstrates its commitment to robust information security and the implementation of controls, systems, and processes to protect sensitive customer data.

“Protecting our customers’ business is our top priority, which requires strict controls to secure their data,” said Pandian Gnanaprakasam, co-founder and Chief Product Officer of Ordr. “We’ve invested heavily in our security programs and operations. Today’s SOC 2 announcement is a testament to the rigor and diligence in the way we build our product, run our cloud and data center operations, how we protect our IT assets, and how we secure our customer instances on a daily basis. It demonstrates to our customers our commitment to security, and is another example of how Ordr is leading the connected device security market.”Prediction Series Banner

Top iTechnology Analytics News: Strategy Analytics: Xiaomi’s Global 5G Smartphone Growth Stalls in Q3 2021

To complete the audit, Ordr engaged with an independent third-party auditing firm, who performed an extensive audit and examination of Ordr Systems Control Engine systems, tools, processes and operations. This rigorous and comprehensive audit validated that Ordr controls were implemented properly in the following areas:

    • Information security policies and procedures
    • Systems, information, network, infrastructure security
    • Secure software development methodologies
    • Employee engagement and training
    • Customer support
    • Vendor management
    • Cloud and data center operations
    • Risk mitigation and incident response
    • Logical and physical access controls

Top iTechnology Cybersecurity News: Crossword Cybersecurity and Liverpool John Moores University Research Reveals Underlying Supply Chain Assurance Issues

“With cybersecurity attacks hitting the headlines every week, security vendors play a critical role in securing any customer data outside the confines of an organization’s own technical infrastructure. As a result, SOC 2 certification is a key requirement for CISOs when they look at partnering with a new security vendor. Achieving SOC 2 compliance means that Ordr’s existing and future customers can be confident that their data is being handled with the proper security, confidentiality and privacy controls,” said Greg Murphy, CEO, Ordr.

The Ordr SCE platform provides comprehensive visibility and security into all connected devices  including workstations, servers, PCs and tablets, loT, IoMT, and OT. Customers discover granular details about every connected device, gain actionable insights into threats, vulnerabilities, or anomalous behavior, and can automate the implementation of proactive, reactive, or retrospective policies to rapidly mitigate risk.

Top iTechnology Digital Transformation News: UKCloud announces Strategic Partnership with Data Virtualisation Leader Denodo

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Energous and Veea Partner to Target Real-Time Asset Tracking of Mass IoT Deployments in Industrial

Business Wire

Airbyte No-Code Builder Revolutionizes Data Integrations, Creates Connectors in Just Minutes

Business Wire

Red Hat Becomes Continuous Delivery Foundation(CDF) Premier Member

CIO Influence News Desk

Leave a Comment