Eagle Eye Networks, the front-runner in cloud video surveillance, announced it successfully completed the SOC 2 (System and Organisation Controls) Type 2 examination, a rigorous security standard, which certifies that Eagle Eye Networks policies and procedures securely protect and manage customer data.

The company also completed conformance with ISO 27001:2013 security standards.

Fulfills criteria

The SOC 2 Type 2 audit evaluated internal controls over six months to ensure that Eagle Eye Networks satisfies the Trust Services Criteria defined by the American Institute of Certified Public Accountants (AICPA).

The criteria include security, availability, processing integrity, and confidentiality.

Independent validation

Our customers value the priority Eagle Eye Networks places on data security and cybersecurity; it is a foundation on which our company was built and a responsibility we take very seriously,” said Dean Drako, Eagle Eye Networks CEO.

This important audit reinforces our commitment to our customers and provides independent validation of our ongoing efforts to meet and exceed industry standards.

Eagle Eye Networks successfully completed the SOC 2 Type 1, in December 2020.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...