Download PDF version Contact company

Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announced that it has completed the System and Organisation Controls (SOC 2) Type II audit for its portfolio of cloud solutions and the ISMS (Information Security Management System) that governs them.

Internal controls at Genetec are built on the best industry practices and aligned with SOC 2 criteria and requirements. This allows Genetec to have the proper governance, controls, procedures, and safeguards in place to protect customer data from cyber-attacks.

Data protection

It’s just a way to ensure that we’re doing everything to keep our partners’ networks, devices, and data safe"

This report offers Genetec customers and partners peace of mind, as it is a stamp of approval that the company is compliant with best practices in data protection and has all the appropriate safeguards and procedures in place to control who can access sensitive data.

For us, taking this extra step is an important addition to our comprehensive approach to cyber resilience. It’s just one more way to ensure we’re doing everything in our power to keep our partners’ networks, devices, and data safe,” said Mathieu Chevalier, Principal Security Architect, Genetec Inc.

SOC 2 criteria

Defined by the American Institute of Certified Public Accountants (AICPA), SOC 2 defines criteria for service providers to securely manage data and protect the interests of their enterprise clients and the privacy of their customers. SOC 2 Type II offers proof that controls have been implemented properly over several months.

All incidents and significant changes have to be documented in the report, resulting in a more complete picture of how an organisation deals with security over time. The following solutions were evaluated as part of this stringent audit: Security Centre SaaS edition, Genetec Stratocast™, Genetec Clearance™, Genetec ClearID™, and Curb Sense™.

Download PDF version Download PDF version

In case you missed it

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Oil sector cybersecurity - overcoming challenges with Honeywell's csHAZOP
Oil sector cybersecurity - overcoming challenges with Honeywell's csHAZOP

A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a b...

Quick poll
Which feature is most important in a video surveillance system?