Customer trust and data security are critical to everything we do at Transposit
Customer trust and data security are critical to everything we do at Transposit. To ensure your data is secure at all times, security is built into the fabric of our product, infrastructure, and processes. Today we are proud to announce that Transposit has successfully achieved SOC 2 Type II accreditation, cementing our commitment to providing customers with the confidence to keep their critical data safe within the platform and ensuring we uphold the highest industry standards for data security.
The SOC 2 reporting framework, created by AICPA, sets benchmarks for managing user data. They are based on five Trust Services Criteria — privacy, confidentiality, security, availability, and processing integrity. Achieving and maintaining SOC 2 Type II accreditation ensures current and future Transposit customers that we have the proper security, privacy, and compliance controls in place to protect and manage user data.
Transposit worked with the compliance firm, Johanson Group LLP, over a two month period to develop and fine-tune new and existing information security policies to ensure all the necessary controls were in place.
While embarking on our SOC 2 process, many of the underlying controls and processes were naturally in place. This foundation helped to formalize and establish a dedicated team and reduced the time to prepare to just two months. Much of this time was spent fine-tuning policies and establishing more granular security and organizational controls.
Another important part of our journey was the adoption of Vanta for automated evidence collection and assessment. This not only reduced the amount of time spent reviewing controls with our auditors but also ensured the full scope of our assets and systems were always visible to our auditors. This level of transparency further demonstrates our commitment to being secure by default and providing enterprise-grade security in all we do.
Transposit is now poised to repeat this audit on an annual basis and uphold our security posture year over year.
Learn more about Transposit Security. Please reach out to email@example.com to request a copy of the report.