Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Pliant Achieves SOC-2 Type II Compliance, Demonstrating its Commitment to Data Privacy Protection for Clients and End Users

Pliant, a leading provider of advanced orchestration, automation, and integration solutions, announced that it has achieved Service Organization Control 2 (SOC-2) Type II compliance. This certification follows Pliant’s successful completion of an extensive audit of the programs, systems, and measures the Company has implemented to protect the privacy and security of its clients’ and end users’ data.

By completing the rigorous compliance requirements based on standards and restrictions established by the American Institute of Certified Public Accountants (AICPA), Pliant has underscored its strong commitment to maintaining the security, confidentiality, availability, and privacy of its Platform for client organizations and their users. Pliant’s audit was performed by Sensiba San Filippo, LLP, a CPA firm.

Recommended AI: Understanding the Role of AI in Gaming

Related Posts
1 of 40,276

“We’re asking our enterprise customers to trust us to handle their sensitive and confidential information. Building and maintaining that trust is essential for cloud-based providers like us,” said Vess Bakalov, Pliant’s co-founder and CEO. “That’s why attaining this high-level, independent, objective certification was so important. It quantifies the seriousness with which we approach client data security and privacy, and communicates to clients that they can trust the strength of the security systems, protocols, and processes we’ve put in place. That trust is foundational to our business.”

SOC 2 is a popular security and risk framework used to assess security. SOC II Type 2 reports are independent assessments of how cloud-based service providers handle sensitive information. These audits cover both the suitability of a company’s controls and its operating effectiveness. They involve vendors hosting independent inspectors, providing them with documentation of controls, and enabling them to sample and test the participating company’s systems and processes. To establish a verified level of trust, the audits focus on five ‘trust service principles’ – security, availability, processing integrity, confidentiality, and privacy.

Recommended AI: “Bitcoin Has No Intrinsic Value”. Then What Gives Bitcoin Value?

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.