Perimeter 81 is SOC 2 Type 2 Compliant

Our SOC 2 Type 2 certification verifies that we deliver the highest level of security, privacy and compliance to all of our clients. 

Perimeter 81 is SOC 2 Type 2 Compliant

Why SOC 2 Type II Compliance Matters

SOC 2 is a technical audit that requires companies to establish and follow strict information security policies and procedures. 

A SOC II Type 2 compliant service must follow these five “trust service principles” when managing customer data:

Security

System resources must be protected from unauthorized access or improper disclosure of information. To secure access, organizations can implement security tools such as two-factor authentication, web application firewalls (WAFs), Cloud VPNs and Software-Defined Perimeters (SDPs).

Availability

Accessibility of the system is determined by a contract or service level agreement (SLA). While this doesn’t apply to system functionality, it does require network performance to be monitored, including security incidents, site failover and other security-related issues that may affect availability.

Processing Integrity

To achieve processing integrity, the system must provide efficient data processing by delivering complete and valid information to the right place at the right time. By monitoring data and implementing quality assurance, organizations can begin to ensure processing integrity.

Confidentiality

Confidential data must be hidden from unauthorized persons or organizations. Network and application firewalls along with access controls are essential for safeguarding sensitive data. Additionally, encryption can be used to protect confidentiality during transmission.

Privacy

Organizations must meet privacy standards that address the collection, use, retention, disclosure and disposal of personal information in accordance with the AICPA’s Generally Accepted Privacy Principles (GAPP).

A Unified Security Solution

Perimeter 81 is a SOC 2 Type 2 certified solution that is affordable, easy-to-use and offers sophisticated security controls.  

1-cube-vertical-cards
Centralized Monitoring

Centralized Monitoring

With a centralized cloud management platform, you can monitor system activity, view system configuration changes and assign user access controls. This includes of all your on-premises and cloud environments, ensuring complete network security. 

2-cube-vertical-cards
Sensible Alerting

Sensible Alerting

If the system detects unauthorized access to customer data, sensible alerting allows you to respond and take corrective action in no time – without enduring alert fatigue. This includes access or modification of data, controls, or configurations and file transfer activities.

3-cube-vertical-cards
Detailed Audit Trails

Detailed Audit Trails

Audit trails provide insights into the modification, addition, or removal of key system components. Unauthorized modifications of data and configurations, attack impact details and point of source data are all recorded.

4-cube-vertical-cards
Actionable Forensics

Actionable Forensics

See where an attack originated, what parts of the network it accesses, if the system was impacted and if so, how severely. Finally, effectively detect threats, mitigate impact, and implement corrective measures to prevent similar events from resurfacing in the future. 

Get Started with Perimeter 81

At Perimeter 81, you can count on us to provide the security necessary to protect even your most sensitive data. By exceeding global standards and achieving certifications, we’re constantly working to earn your trust.