Cogniac AI Vision Platform Confirmed as Type 2 SOC 2 Compliant for Data Security

Smart Engines Triples the Precision of the ID Documents Machine-Readable Zone Scanner

Cogniac Corporation , a San Jose, California-based provider of enterprise-class Artificial Intelligence (AI) image and video analysis, announced its successful completion of the System and Organization Controls (SOC) 2 evaluation process, through an audit by A-LIGN, a leading advisor in corporate cyber-security compliance.

Read More:  Oro Inc. Launches OroMarketplace to Drive Multichannel B2B Sales Growth for Businesses

Cogniac’s completion of Type 2 SOC 2 compliance in the Security Trust Service Principle demonstrates the high cyber-security standards of the platform, protecting the data and privacy of customers and vendors. The audit seeks to identify gaps in coverage which could allow attackers or malicious entities access to confidential or private information. Cogniac undertook the process to ensure the platform provides the best possible experience for customers and partners, and most importantly, their safety.

“Cogniac’s successful completion of the SOC 2 evaluation is evidence that we invest in the protection of our customers’ data,” said Richard Meyer, vice president of Operations and Programs at Cogniac. “Our platform and model only succeed if we’re protecting the data and privacy of our customers. We understand this process is optional for organizations like ours, but we’re driven by our values of ‘Innovation’ and ‘Security’ and hold them as elemental to our work as a developer of AI, a product vendor, and a technology partner.”

Read More:  SalesTechStar Interview with Nikhita Hyett, MD, Europe at BlueSnap

The SOC audit assesses a system and its related processes’ compliance across one or more of the five Trust Service Principles developed by the American Institute of CPAs (AICPA):

  • Security – Firewalls, Intrusion Detection, and Multi-factor Authentication
  • Availability – Performance Monitoring, Disaster Recovery, and Incident Handling
  • Processing – Encryption, Access Controls, and Firewalls
  • Integrity – Quality Assurance and Process Monitoring
  • Privacy – Access Control, Multi-Factor Authentication, and Encryption

SOC 2 compliance isn’t a requirement for cloud computing organizations but serves as a demonstration of commitment to the safety of customers and partners’ data within a system.

Read More:  Winning In Sales In A Pandemic, One Year Later

Write in to psen@itechseries.com to learn more about our exclusive editorial packages and programs.