Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

dotCMS Maintains Effective Security Controls According to SOC 2 Report

dotCMS announced that the company has successfully undergone a System and Organization Controls 2 Type II examination (SOC 2 Type II) resulting in a CPA’s report stating that management of dotCMS maintained effective controls over the security, availability, and confidentiality of its dotCMS Cloud system. The engagement was performed by BARR Advisory, P.A.

A SOC 2 report is an internal control report on the services provided by a service organization to its customers and provides valuable information that existing and potential customers of the service organization need to assess and address the risks associated with the outsourced service. Unlike a SOC 2 Type I report, which only assesses a single point in time, a SOC 2 Type II report is more comprehensive, as it measures how effective security controls are over multiple months of standard operation.

Recommended AI News: MicroTech Partners with Visium Technologies

Related Posts
1 of 27,775

“We are pleased that our SOC 2 report has shown we have instituted and maintained the appropriate controls over time and that we have effectively mitigated risks related to our customers’ security, availability, and confidentiality”, said Will Ezell, Chief Technology Officer. “The report reflects the hard work that our engineering and administrative teams have put in over the past year in securing and maturing our services and cloud offerings.”

The following principles and related criteria have been developed by the American Institute of CPAs (AICPA) for use by practitioners in the performance of trust services engagements:

  • Security: The system is protected against unauthorized access (both physical and logical).
  • Availability: The system is available for operation and use as committed or agreed.
  • Confidentiality: Information designated as confidential is protected as committed or agreed.

Recommended AI News: INTERSWITCH Partners with INTERSTELLAR to Develop Blockchain-powered Infrastructure Services and Solutions

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.