Kontent.ai completes SOC 2 Type 2 examination
At the end of last year, Kontent.ai passed the SOC 2 Type 1 examination. We’re delighted to announce that, as of today, our product is also SOC 2 Type 2 compliant.
Published on Apr 6, 2020
At the end of last year, Kontent.ai passed the SOC 2 Type 1 examination. We’re delighted to announce that, as of today, our product is also SOC 2 Type 2 compliant.
Published on Apr 6, 2020
We at Kontent.ai believe that security is a continuous process and requires continuous improvement. We’ve been pursuing the highest security standards to prove our commitment to protecting the privacy and interests of our enterprise clients. This is why we’re glad to announce that we’ve reached another of our goals and passed the SOC 2 Type 2 examination.
As you might recall from our previous article, SOC 2 is an auditing procedure designed for service providers storing customer data in the cloud. There are two types of SOC 2; while the SOC 2 Type 1 focuses on the procedures and controls relating to one or all of the so-called Trust Services Criteria (TSC) that a company has put in place as of the time of evaluation, the SOC 2 Type 2 assesses how effective the controls in place are over a longer period of time.
The audit is conducted by an objective and independent third party that measures the company’s compliance with current industry standards. In 2019, we got the SOC 2 Type 1 report covering these Trust Services Criteria that are relevant to the services we provide:
A few months have passed since we got the SOC 2 Type 1 report, and our procedures and controls in place have proved effective. The SOC 2 Type 2 report proves that we’ve been compliant with the requirements in the areas of availability, security, and confidentiality (if you want to learn more about SOC 2 and Trust Services Criteria, you can have a look at their resources here).
Enterprise customers need enterprise solutions they can trust, and we’re committed to providing the highest quality of services (for more information, see our Security Policy).