Rigorous audit validates Analyzr as trusted, no-code machine learning platform built for go-to-market teams.
G2M Insights, a business and technology consulting firm supporting the go-to-market strategy and execution of B2B sales and marketing teams, is announcing it has successfully completed the System and Organization Controls (SOC) 2 Type 2 audit for its Analyzr platform—an analytics software as a service that makes machine learning simple and secure for midmarket and enterprise customers.
Successfully completing our SOC 2 Type 2 audit is an important milestone for us, as we continue to demonstrate our commitment to being a trusted analytics partner to all of our clients.
SOC 2 reports are industry-recognized, independent audits which:
- Assure the design and effectiveness of controls in place at a service organization;
- Demonstrate the company’s ability to adhere to critical security practices;
- Provide detailed information about the controls at a service organization relevant to security, availability, confidentiality, processing, and privacy.
Read More: GreyOrange Raises Item-Level Accuracy to 99% with gStore Overhead RFID Technology
This achievement validates and reinforces our commitment to keeping our customers’ data safe, secure, and available in the Analyzr platform. Our customers can feel confident that we are making every investment to maintain and build on the highest levels of security and compliance.
“We’re thrilled to have obtained our SOC 2 unqualified opinion” said Derek Azuara, co-founder and Chief Information Security Officer of G2M Insights. “Successfully completing our SOC 2 Type 2 audit is an important milestone for us, as we continue to demonstrate our commitment to being a trusted analytics partner to all of our clients.”
In addition to ensuring all employees complete and continue an ongoing security training program, G2M Insights is committed to:
- Employing best practices when handling customer data;
- Working with industry leading security firms to perform annual network and application layer penetration tests;
- Utilizing a variety of data security and vulnerability checks throughout the software development lifecycle;
- Encrypting all data both in-transit using TLS and at rest as appropriate.
A copy of the SOC 2 audit report is available to clients and prospective clients upon request.