Cloudentity Earns Two Globally Recognized Security Certifications, Supporting Stringent Compliance Standards Across Global Markets and Industries
Cloudentity, a leading provider of B2B identity and authorization solutions, announced it has achieved SOC (System and Organization Controls) 2 Type 2 and ISO (International Organization of Standardization) 27001 certifications, confirming that its cloud-scale authorization solutions are compliant with the two most globally recognized and trusted security standards. The security and compliance audit was performed by BARR Advisory, P.A.
Top iTechnology Cloud News: Fivetran Deepens Relationship with Google Cloud: Partner for Google Cloud Cortex Framework and Launch Partner for Google Cloud Ready – BigQuery Program
“Achieving these key industry certifications bolsters Cloudentity’s position as a trusted partner for the publicly-traded organizations and financial institutions that we serve. These organizations are beholden to strict internal security controls as well as industry-imposed regulations,” said Brook Lovatt, Chief Product Officer of Cloudentity. “In addition, maintaining both SOC 2 Type 2 and ISO 27001 compliance positions Cloudentity to serve a broad international community of organizations that will only adopt solutions from certified vendors. The required compliance types and levels vary from region to region, but nearly all require either SOC 2 or ISO, and some require both.”
As cyber threats evolve, businesses often rely on maintaining compliance standards within their own organization’s infrastructure to ensure the required levels of assurance. Most of these businesses require the same levels of compliance from the software vendors and service providers they work with. By achieving compliance certification for both SOC 2 Type 2 and ISO 27001, Cloudentity has solidified its position as the top SaaS authorization platform that can be implemented by companies with even the most stringent security policies and postures.
Top iTechnology Security News: Red Sift Strengthens Email Security For Cybersecurity-First Organizations Hosted on Microsoft Azure
SOC 2 Type 2 reports are designed to meet the needs of existing or potential customers who need assurance about the effectiveness of controls used by the service organization to process customers’ information. For compliance, companies must meet the following principles and related criteria from the American Institute of CPAs (AICPA) for practitioners in the performance of trust services engagements:
- Security: The system is protected against unauthorized access (both physical and logical).
- Availability: The system is available for operation and use as committed or agreed.
- Processing Integrity: System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.
- Confidentiality: Information designated as confidential is protected as committed or agreed.
- Privacy: Personal information is collected, used, retained, disclosed, and disposed of to meet the entity’s objectives.
- HIPAA Security Rule Requirements: The system is compliant with the applicable HIPAA Security Rule requirements set forth in the U.S. Department of Health and Human Services (HHS) Health Information Portability and Accountability Act.
Top iTechnology Cloud News: Glenn Gerstell, Former General Counsel of the US National Security Agency, to Address Attendees at Cloud Security Alliance SECtemberSM
[To share your insights with us, please write to sghosh@martechseries.com]