Pliant Achieves SOC-2 Type II Compliance, Demonstrating its Commitment to Data Privacy Protection for Clients and End Users

Successful completion of rigorous audit verifies that the Pliant Orchestration and Automation Platform meets enterprise customers’ demands for the highest security standards

Pliant, a leading provider of advanced orchestration, automation, and integration solutions, today announced that it has achieved Service Organization Control 2 (SOC-2) Type II compliance. This certification follows Pliant’s successful completion of an extensive audit of the programs, systems, and measures the Company has implemented to protect the privacy and security of its clients’ and end users’ data.

By completing the rigorous compliance requirements based on standards and restrictions established by the American Institute of Certified Public Accountants (AICPA), Pliant has underscored its strong commitment to maintaining the security, confidentiality, availability, and privacy of its Platform for client organizations and their users. Pliant’s audit was performed by Sensiba San Filippo, LLP, a CPA firm.

Marketing Technology News: Progress Earns Multiple Awards and Recognitions in the Second Half of 2022

“We’re asking our enterprise customers to trust us to handle their sensitive and confidential information. Building and maintaining that trust is essential for cloud-based providers like us”

“We’re asking our enterprise customers to trust us to handle their sensitive and confidential information. Building and maintaining that trust is essential for cloud-based providers like us,” said Vess Bakalov, Pliant’s co-founder and CEO. “That’s why attaining this high-level, independent, objective certification was so important. It quantifies the seriousness with which we approach client data security and privacy, and communicates to clients that they can trust the strength of the security systems, protocols, and processes we’ve put in place. That trust is foundational to our business.”

SOC 2 is a popular security and risk framework used to assess security. SOC II Type 2 reports are independent assessments of how cloud-based service providers handle sensitive information. These audits cover both the suitability of a company’s controls and its operating effectiveness. They involve vendors hosting independent inspectors, providing them with documentation of controls, and enabling them to sample and test the participating company’s systems and processes. To establish a verified level of trust, the audits focus on five ‘trust service principles’ – security, availability, processing integrity, confidentiality, and privacy.

Marketing Technology News: MarTech Interview With Laura Connell, Consumer Trends Manager at GWI

Brought to you by
For Sales, write to: contact@martechseries.com
Copyright © 2024 MarTech Series. All Rights Reserved.Privacy Policy
To repurpose or use any of the content or material on this and our sister sites, explicit written permission needs to be sought.