Successful compliance audit showcases ThreatQuotient’s continued dedication to exceeding customer expectations for security and data protection
ThreatQuotient, a leading security operations platform innovator, today announced that it has successfully completed a Service Organisation Controls (SOC) 2 Type II compliance audit for its ThreatQ Platform. This certification validates that ThreatQuotient’s security and governance controls previously verified by Type I effectively maintain the security, confidentiality and availability of their hosted service. The independent firm Clearview Group, conducted the audit.
A key industry standard in data security, SOC 2 evaluates a technology service provider’s ability to securely manage customer data. To achieve a SOC 2 Type II designation, organisations undergo a rigorous audit that analyses the following trust services criteria: security, availability, processing integrity, confidentiality and privacy. ThreatQuotient’s continued adherence to its policies were tested and confirmed by the Type II audit process.
“It takes tremendous discipline and organisation to provide on-demand evidence throughout an audit that a company is exercising their policies and procedures. ThreatQuotient is proud of this achievement, and considers SOC 2 Type II compliance just one of the many ways we intend to continue meeting and exceeding industry security standards,” said Tom Ashoff, Senior Vice President of Engineering, ThreatQuotient. “Achieving a favourable examination of ThreatQ provides our customers with the confidence that we have the proper controls in place to protect their data, and assurance of the availability and confidentiality of their hosted service.”
As customer needs continue to evolve, ThreatQuotient is committed to providing innovative threat detection and response solutions. ThreatQuotient recently announced v5 of the ThreatQ platform, launching capabilities needed today to support the security operations center (SOC) of the future, where data is the foundation. ThreatQ connects the dots, bringing an organisation’s wealth of data together into a common work surface, providing data-driven security context that enables teams to be more thorough in their investigations, collaboration, response and reporting.