CIO Influence
CIO Influence News Cloud Security

Cogniac AI Vision Platform Confirmed as Type 2 SOC 2 Compliant for Data Security

Cogniac AI Vision Platform Confirmed as Type 2 SOC 2 Compliant for Data Security

Cogniac Corporation (“Cogniac”), a San Jose, California-based provider of enterprise-class Artificial Intelligence (AI) image and video analysis, announced its successful completion of the System and Organization Controls (SOC) 2 evaluation process, through an audit by A-LIGN, a leading advisor in corporate cyber-security compliance.

Cogniac’s completion of Type 2 SOC 2 compliance in the Security Trust Service Principle demonstrates the high cyber-security standards of the platform, protecting the data and privacy of customers and vendors. The audit seeks to identify gaps in coverage which could allow attackers or malicious entities access to confidential or private information. Cogniac undertook the process to ensure the platform provides the best possible experience for customers and partners, and most importantly, their safety.

Recommended ITech News: Senior Microsoft Executive Joins Leader in DevOps for Intelligent Edge Devices

“Cogniac’s successful completion of the SOC 2 evaluation is evidence that we invest in the protection of our customers’ data,” said Richard Meyer, vice president of Operations and Programs at Cogniac. “Our platform and model only succeed if we’re protecting the data and privacy of our customers. We understand this process is optional for organizations like ours, but we’re driven by our values of ‘Innovation’ and ‘Security’ and hold them as elemental to our work as a developer of AI, a product vendor, and a technology partner.”

The SOC audit assesses a system and its related processes’ compliance across one or more of the five Trust Service Principles developed by the American Institute of CPAs (AICPA):

  • Security – Firewalls, Intrusion Detection, and Multi-factor Authentication
  • Availability – Performance Monitoring, Disaster Recovery, and Incident Handling
  • Processing – Encryption, Access Controls, and Firewalls
  • Integrity – Quality Assurance and Process Monitoring
  • Privacy – Access Control, Multi-Factor Authentication, and Encryption

SOC 2 compliance isn’t a requirement for cloud computing organizations but serves as a demonstration of commitment to the safety of customers and partners’ data within a system.

Recommended ITech News: Lean BI Tech Selects InetSoft for Integration Into Its Cloud Based Decision-Making Solution

Related posts

More than a Third of Organizations Hold No One Accountable for Cyberattacks, according to Research from LogRhythm

CIO Influence News Desk

Employee Service Provider Personal Group Deploys LogRhythm SIEM to Proactively Fight Cybersecurity Threats

CIO Influence News Desk

G2 Names Zerto a Leader in Multiple Categories

CIO Influence News Desk

Leave a Comment