CIO Influence
CIO Influence News IT and DevOps Security

dotCMS Maintains Effective Security Controls According to SOC 2 Report

dotCMS Maintains Effective Security Controls According to SOC 2 Report
dotCMS announced that the company has successfully undergone a System and Organization Controls 2 Type II examination (SOC 2 Type II) resulting in a CPA’s report stating that management of dotCMS maintained effective controls over the security, availability, and confidentiality of its dotCMS Cloud system.

dotCMS announced that the company has successfully undergone a System and Organization Controls 2 Type II examination (SOC 2 Type II) resulting in a CPA’s report stating that management of dotCMS maintained effective controls over the security, availability, and confidentiality of its dotCMS Cloud system. The engagement was performed by BARR Advisory, P.A.

A SOC 2 report is an internal control report on the services provided by a service organization to its customers and provides valuable information that existing and potential customers of the service organization need to assess and address the risks associated with the outsourced service. Unlike a SOC 2 Type I report, which only assesses a single point in time, a SOC 2 Type II report is more comprehensive, as it measures how effective security controls are over multiple months of standard operation.

Top iTechnology AIOps News: Data Tells a Story with the Launch of IntelliSite DeepInsights Software Solution

“We are pleased that our SOC 2 report has shown we have instituted and maintained the appropriate controls over time and that we have effectively mitigated risks related to our customers’ security, availability, and confidentiality”, said Will Ezell, Chief Technology Officer. “The report reflects the hard work that our engineering and administrative teams have put in over the past year in securing and maturing our services and cloud offerings.”

The following principles and related criteria have been developed by the American Institute of CPAs (AICPA) for use by practitioners in the performance of trust services engagements:

  • Security: The system is protected against unauthorized access (both physical and logical).
  • Availability: The system is available for operation and use as committed or agreed.
  • Confidentiality: Information designated as confidential is protected as committed or agreed.

Current and prospective customers interested in a copy of our SOC 2 report may contact their sales or customer success representatives for a copy of the report.

Top iTechnology News: Octopai Announces Support of Amazon Redshift, Continuing to Empower BI & Analytics Groups with Advanced Data Intelligence in Complex BI Environments

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

DNP Develops Reflect Array to Expand 5G Coverage Area

OVHcloud US Adds High Performance and Standard Object Storage Enabling Big Data and Cloud Native Applications for Customers with Cost-Predictability

PR Newswire

Datto Releases Tool for MSP Community to Combat Log4j Vulnerability

CIO Influence News Desk

Leave a Comment