System Surveyor announced the successful completion of its SOC 2 Type 2 compliance, marking a significant achievement for the company whose intelligent, all-in-one platform sets the standard in the industry for easy and collaborative site surveys, physical security system design and management.
Established by the American Institute of Certified Public Accountants (AICPA), the Service Organisation Control (SOC) Type 2 report is a third-party audit that evaluates how effectively a cloud-based service provider safeguards its customers’ sensitive information. As a globally recognised audit report, SOC 2 Type 2 certification affirms that a company’s internal controls for security, confidentiality, processing integrity, privacy and customer data availability work well over an extended period of time.
SOC 2 Type 2 certification
Data security is becoming increasingly important for small and large businesses alike"
“In today’s environment, data security is becoming increasingly important for small and large businesses alike,” said System Surveyor CEO Chris Hugman.
“While System Surveyor has always been mindful of maintaining a secure environment for its users, this SOC 2 Type 2 certification was awarded following a yearlong review of our policies, procedures and operations, as well as platform testing by external auditors. This achievement clearly demonstrates our commitment and priority to data security. We want our customers and partners to have strong confidence when they entrust their data to System Surveyor.”
Lifecycle management
With drag-and-drop security device functionality, System Surveyor streamlines site surveys and collaborative security system design, helping its users save time, win projects and document their physical security systems for lifecycle management.
As a SOC 2 Type 2-compliant organisation, System Surveyor provides its physical security industry and building automation customers with strong third-party validation of its compliance systems, offering stringent protection for all internal and customer-facing systems against unauthorised access, unauthorised disclosure of information and damage to systems that could compromise the confidentially of information or systems.