CIO Influence
CIO Influence News Security

Pliant Achieves SOC-2 Type II Compliance, Demonstrating its Commitment to Data Privacy Protection for Clients and End Users

Pliant Achieves SOC-2 Type II Compliance, Demonstrating its Commitment to Data Privacy Protection for Clients and End Users

Pliant, a leading provider of advanced orchestration, automation, and integration solutions, announced that it has achieved Service Organization Control 2 (SOC-2) Type II compliance. This certification follows Pliantโ€™s successful completion of an extensive audit of the programs, systems, and measures the Company has implemented to protect the privacy and security of its clientsโ€™ and end usersโ€™ data.

By completing the rigorous compliance requirements based on standards and restrictions established by the American Institute of Certified Public Accountants (AICPA), Pliant has underscored its strong commitment to maintaining the security, confidentiality, availability, and privacy of its Platform for client organizations and their users. Pliantโ€™s audit was performed by Sensiba San Filippo, LLP, a CPA firm.

CIO INFLUENCE: Datometry Releases Driver Integration for BigQuery, Further Future-Proofing Its Customersโ€™ Investments

โ€œWeโ€™re asking our enterprise customers to trust us to handle their sensitive and confidential information. Building and maintaining that trust is essential for cloud-based providers like us,โ€ said Vess Bakalov, Pliantโ€™s co-founder and CEO. โ€œThatโ€™s why attaining this high-level, independent, objective certification was so important. It quantifies the seriousness with which we approach client data security and privacy, and communicates to clients that they can trust the strength of the security systems, protocols, and processes weโ€™ve put in place. That trust is foundational to our business.โ€

SOC 2 is a popular security and risk framework used to assess security. SOC II Type 2 reports are independent assessments of how cloud-based service providers handle sensitive information. These audits cover both the suitability of a companyโ€™s controls and its operating effectiveness. They involve vendors hosting independent inspectors, providing them with documentation of controls, and enabling them to sample and test the participating companyโ€™s systems and processes. To establish a verified level of trust, the audits focus on five โ€˜trust service principlesโ€™ โ€“ security, availability, processing integrity, confidentiality, and privacy.

CIO INFLUENCE: Ericsson presents a Green Financing Framework

[To share your insights with us, please write toย sghosh@martechseries.com]

Related posts

Movellus Launches Maestro Intelligent Clock Network Platform for SoC Designs

CIO Influence News Desk

Cybersecurity Experts from GoSecure Will Reveal Unprecedented Insights into RDP Attacks with Innovative Honeynet

Business Wire

Raytheon Technologies Partners With Kyndryl to Advance Its Digital Transformation Efforts

CIO Influence News Desk