CIO Influence
CIO Influence News Security

Pliant Achieves SOC-2 Type II Compliance, Demonstrating its Commitment to Data Privacy Protection for Clients and End Users

Pliant Achieves SOC-2 Type II Compliance, Demonstrating its Commitment to Data Privacy Protection for Clients and End Users

Pliant, a leading provider of advanced orchestration, automation, and integration solutions, announced that it has achieved Service Organization Control 2 (SOC-2) Type II compliance. This certification follows Pliant’s successful completion of an extensive audit of the programs, systems, and measures the Company has implemented to protect the privacy and security of its clients’ and end users’ data.

By completing the rigorous compliance requirements based on standards and restrictions established by the American Institute of Certified Public Accountants (AICPA), Pliant has underscored its strong commitment to maintaining the security, confidentiality, availability, and privacy of its Platform for client organizations and their users. Pliant’s audit was performed by Sensiba San Filippo, LLP, a CPA firm.

CIO INFLUENCE: Datometry Releases Driver Integration for BigQuery, Further Future-Proofing Its Customers’ Investments

“We’re asking our enterprise customers to trust us to handle their sensitive and confidential information. Building and maintaining that trust is essential for cloud-based providers like us,” said Vess Bakalov, Pliant’s co-founder and CEO. “That’s why attaining this high-level, independent, objective certification was so important. It quantifies the seriousness with which we approach client data security and privacy, and communicates to clients that they can trust the strength of the security systems, protocols, and processes we’ve put in place. That trust is foundational to our business.”

SOC 2 is a popular security and risk framework used to assess security. SOC II Type 2 reports are independent assessments of how cloud-based service providers handle sensitive information. These audits cover both the suitability of a company’s controls and its operating effectiveness. They involve vendors hosting independent inspectors, providing them with documentation of controls, and enabling them to sample and test the participating company’s systems and processes. To establish a verified level of trust, the audits focus on five ‘trust service principles’ – security, availability, processing integrity, confidentiality, and privacy.

CIO INFLUENCE: Ericsson presents a Green Financing Framework

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

BlackBerry Launches BlackBerry Jarvis 2.0 to Address Expanding Global Embedded Cybersecurity Landscape

CIO Influence News Desk

MACOM and MaxLinear Collaborate on 100G, 400G and 800G Solutions for Data Center Applications

CIO Influence News Desk

Kinetica Now Available as a Service in AWS Marketplace

CIO Influence News Desk