Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

XM Cyber Achieves SOC 2 Type II Certification for Second Consecutive Year

Cybersecurity Leader Reinforces Its Commitment to Client Data Protection

XM Cyber, the multi-award-winning leader in breach and attack simulation (BAS), advanced cyber risk analytics and cloud security posture management, announced that, for the second consecutive year, it has achieved SOC (System and Organization Controls) 2 Type II compliance.

This indicates that the company had adequate measures in place to protect its clients’ sensitive data for the period of August 2019-2020. The audit was conducted by EY Israel in compliance with the attestation standards set by the American Institute of Certified Public Accountants (AICPA).

Recommended AI News: Mozambique Pins Hope on Germany to Revive Gas Industry Opportunities in 2020-21

“This certification should give our customers, partners and prospects confidence in our ability to ensure the privacy of their data, as well as that of their own clients,” said Raz Kotler, VP of Customer Operations and CISO, XM Cyber. “Our platform represents the most advanced attack simulation modeling system available for today’s complex networks. We are introducing the next generation of breach and attack simulation.”

Related Posts
1 of 21,995

SOC 2 Type II is the global standard for secure and confidential information handling for cloud services. A SOC 2-certified partner is required for businesses whose regulators, auditors, compliance officers, business partners, and executives require documented standards. To earn the prestigious Type II classification, companies must undergo rigorous testing of policies and procedures.

Recommended AI News: Capsule8 Strengthens Customer Support and Partnership Leadership

“To obtain SOC 2 Type II compliance, companies must pass a strict auditing process that takes into consideration a vendor’s access controls, change management, system operations and risk mitigation. We’ve passed all of these checkmarks with flying colors and are well prepared to keep client data secure against both existing threats and the unknown threats that seemingly arise every day,” added Kotler.

The XM Cyber platform identifies the most important security gaps and prioritizes remediation, providing enterprises with a continuous cycle of security measurement, prioritization and improvement. Unlike BAS companies that focus solely on security control validation, XM Cyber identifies security holes resulting from misconfigurations, vulnerabilities and human error. XM Cyber has been audited and found to meet SOC 2 Type II criteria based on five separate data and storage trust factors: security, availability, privacy, confidentiality, and processing integrity.

Recommended AI News: ExtraHop CX 84 Percent Reduction in Time to Resolve Threats: Independent Research Firm

Leave A Reply

Your email address will not be published.