Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Enigma Achieves SOC2 Type I Compliance, Demonstrating Its Commitment to Data Privacy and Security

Enigma, the leading provider of reliable and accessible data and intelligence on small businesses, announces that it has been certified as SOC2 Type I compliant. Enigma’s audit was conducted independently by the Cadence Group, a CPA firm with vast experience auditing software-as-a-service vendors.  This audit focused on Enigma’s data protection and security measures; along with system availability, operational and legal procedures.

Enigma proudly notes that its first Type I report was a “clean report” with no exceptions noted; illustrating Enigma’s dedication to maintaining a comprehensive and well-managed information security program.  Enigma now joins a small group of security-focused software companies who are able to demonstrate the maturity of their operational and security processes with independent SOC2 attestation.

Recommended AI News: Emerson Firm Announces Ongoing Investigation of Google Tracking Chrome User Data

Some of Enigma’s security practices include:

Encryption everywhere – Enigma follows industry best practices in encrypting all data in transit and at-rest.

Related Posts
1 of 40,383

Data minimization – Enigma only stores limited data/metadata necessary to maintain the service

Centralized Authentication – Enigma staff logins are centrally-managed with role-based privileges and enforcement of multi-factor authentication.  Two members of staff must authorize administrative access to the platform infrastructure on a time-limited basis.

Ongoing Monitoring – Servers and corporate devices are subject to regular security scans and real-time monitoring, with the Enigma team quickly alerted of potential issues.

Recommended AI News: Leading Global Technology Expert Joins Fast-growing Cybersecurity Firm Onevinn

Will Pizzano, CISM, Enigma’s vCISO says, “Enigma has consistently maintained a cybersecurity program at a level of maturity rarely seen at similar companies.  The security architecture at Enigma goes well beyond compliance to offer industry-leading protection to its clients’ data.  Enigma’s clean achievement of SOC2 compliance shows just how seriously Enigma takes its ongoing commitment to data privacy and security. ”

Recommended AI News: Bluberi Expands Executive Leadership Team, Appoints Casey Whalen as Chief Commercial Officer

Comments are closed, but trackbacks and pingbacks are open.