Skip to Content

System Surveyor completes SOC 2 Type 2 compliance

System Surveyor completes SOC 2 Type 2 compliance

AUSTIN, Texas—Mobile cloud-based platform provider System Surveyor has announced the successful completion of its SOC 2 Type 2 compliance.

According to System Surveyor, this marks a significant achievement for the company whose “intelligent, all-in-one platform sets the standard in the industry for easy and collaborative site surveys, physical security system design and management.”

System SurveyorEstablished by the American Institute of Certified Public Accountants (AICPA), the Service Organization Control (SOC) Type 2 report is a third-party audit that evaluates how effectively a cloud-based service provider safeguards its customers’ sensitive information.

As a globally recognized audit report, SOC 2 Type 2 certification affirms that a company’s internal controls for security, confidentiality, processing integrity, privacy, and customer data availability work well over an extended period of time.

“In today’s environment, data security is becoming increasingly important for small and large businesses alike,” said System Surveyor CEO Chris Hugman. “While System Surveyor has always been mindful of maintaining a secure environment for its users, this SOC 2 Type 2 certification was awarded following a yearlong review of our policies, procedures, and operations, as well as platform testing by external auditors. This achievement clearly demonstrates our commitment and priority to data security. We want our customers and partners to have strong confidence when they entrust their data to System Surveyor.”

With drag-and-drop security device functionality, System Surveyor streamlines site surveys and collaborative security system design, helping its users save time, win projects and document their physical security systems for lifecycle management.

As a SOC 2 Type 2-compliant organization, System Surveyor provides its physical security industry and building automation customers with strong third-party validation of its compliance systems, offering stringent protection for all internal and customer-facing systems against unauthorized access, unauthorized disclosure of information and damage to systems that could compromise the confidentially of information or systems.

For more information, visit https://SystemSurveyor.com.

Comments

To comment on this post, please log in to your account or set up an account now.