Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

dotCMS Maintains Effective Security Controls According to SOC 2 Report

dotCMS announced that the company has, again, successfully undergone a System and Organization Controls 2 Type II examination (SOC 2 Type II) resulting in a CPA’s report stating that management of dotCMS maintained effective controls over the security, availability, and confidentiality of its dotCMS Cloud system. This report comes with no exceptions, meaning dotCMS underwent a full year without making a single security error or breaking security policies. The engagement was performed by BARR Advisory, P.A.

A SOC 2 report is an internal control report on the services provided by a service organization to its customers and provides valuable information that existing and potential customers of the service organization need to assess and address the risks associated with the outsourced service. Unlike a SOC 2 Type I report, which only assesses a single point in time, a SOC 2 Type II report is more comprehensive, as it measures how effective security controls are over multiple months of standard operation.

Recommended AI News: New Slack Innovations and Salesforce Customer 360 Integrations Unlock Team Productivity, Adding Value to the Digital HQ

“This report reflects the hard work that our engineering and administrative team have put in each year to maintain the appropriate controls and effectively mitigate risk,” said Will Ezell, Chief Technology Officer of dotCMS. “We are proud to have passed this year’s evaluation with zero exceptions, and we plan to continue this level of success each year.”

Related Posts
1 of 40,572

The following principles and related criteria have been developed by the American Institute of CPAs (AICPA) for use by practitioners in the performance of trust services engagements:

Security: The system is protected against unauthorized access (both physical and logical).
Availability: The system is available for operation and use as committed or agreed.
Confidentiality: Information designated as confidential is protected as committed or agreed.

Recommended AI News: Wiha Tools USA Adopts New Salsify Connector to Amazon A+ API

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.