Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announced that it has completed the System and Organization Controls (SOC 2) Type II audit for its portfolio of cloud solutions and the ISMS (Information Security Management System) that governs them.

Internal controls at Genetec are built on the best industry practices and aligned with SOC 2 criteria and requirements. This allows Genetec to have the proper governance, controls, procedures, and safeguards in place to protect customer data from cyber-attacks.

Data protection

It’s just a way to ensure that we’re doing everything to keep our partners’ networks, devices, and data safe"

This report offers Genetec customers and partners peace of mind, as it is a stamp of approval that the company is compliant with best practices in data protection and has all the appropriate safeguards and procedures in place to control who can access sensitive data.

For us, taking this extra step is an important addition to our comprehensive approach to cyber resilience. It’s just one more way to ensure we’re doing everything in our power to keep our partners’ networks, devices, and data safe,” said Mathieu Chevalier, Principal Security Architect, Genetec Inc.

SOC 2 criteria

Defined by the American Institute of Certified Public Accountants (AICPA), SOC 2 defines criteria for service providers to securely manage data and protect the interests of their enterprise clients and the privacy of their customers. SOC 2 Type II offers proof that controls have been implemented properly over several months.

All incidents and significant changes have to be documented in the report, resulting in a more complete picture of how an organization deals with security over time. The following solutions were evaluated as part of this stringent audit: Security Center SaaS edition, Genetec Stratocast™, Genetec Clearance™, Genetec ClearID™, and Curb Sense™.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...