System Surveyor announced the successful completion of its SOC 2 Type 2 compliance, marking a significant achievement for the company whose intelligent, all-in-one platform sets the standard in the industry for easy and collaborative site surveys, physical security system design and management.

Established by the American Institute of Certified Public Accountants (AICPA), the Service Organization Control (SOC) Type 2 report is a third-party audit that evaluates how effectively a cloud-based service provider safeguards its customers’ sensitive information. As a globally recognized audit report, SOC 2 Type 2 certification affirms that a company’s internal controls for security, confidentiality, processing integrity, privacy and customer data availability work well over an extended period of time.

SOC 2 Type 2 certification

Data security is becoming increasingly important for small and large businesses alike"

In today’s environment, data security is becoming increasingly important for small and large businesses alike,” said System Surveyor CEO Chris Hugman.

While System Surveyor has always been mindful of maintaining a secure environment for its users, this SOC 2 Type 2 certification was awarded following a yearlong review of our policies, procedures and operations, as well as platform testing by external auditors. This achievement clearly demonstrates our commitment and priority to data security. We want our customers and partners to have strong confidence when they entrust their data to System Surveyor.”

Lifecycle management

With drag-and-drop security device functionality, System Surveyor streamlines site surveys and collaborative security system design, helping its users save time, win projects and document their physical security systems for lifecycle management.

As a SOC 2 Type 2-compliant organization, System Surveyor provides its physical security industry and building automation customers with strong third-party validation of its compliance systems, offering stringent protection for all internal and customer-facing systems against unauthorized access, unauthorized disclosure of information and damage to systems that could compromise the confidentially of information or systems.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...