Security Commitment
Last Revised: April 11, 2024
At AudioEye, we hold the highest regard for security and privacy. Safeguarding the data we handle, including the personal information of our customers, has always been and will always be our top-most priority. We believe in an unwavering dedication to ensure a secure and compliant environment is reflected in every aspect of our operations, from our structural framework to our educational pursuits and even our recruitment process.
Data Protection and Privacy
Availability
We build highly available products that service various monitoring and observability needs for our customers. We adhere to our service level agreements (SLAs) of 99.99% availability.
Product Security
Product security is of paramount importance at AudioEye. We incorporate security into the design of our products from the beginning stages of our software development lifecycle.
Patch Management
AudioEye releases software patches as part of our continuous integration process. We strive to ensure patches that can impact end users are applied as soon as possible and within our established service level agreements (SLA) by sending end user notifications and scheduling service windows.
Vendor Management
AudioEye leverages a number of third party applications and services in support of the delivery of our products to our customers. The AudioEye Security Team recognizes that the company’s information assets and vendor dependencies are critical to our continuing operations and delivery of services. As such, AudioEye’s Security and Privacy teams have established a vendor management program that sets forth the requirements to be established and agreed upon when AudioEye engages with third parties or external vendors. These engagements are designed to assess the technical, physical, and administrative controls in place and to ensure they are commensurate with the expectations of AudioEye and its customers.
AudioEye’s Service and Organization Controls (SOC) 2 Type 1 Compliance
Ensuring Trust and Security: Our SOC 2 Compliance
At AudioEye, safeguarding your data and ensuring the highest standards of security is our top priority. That’s why our company proudly maintains SOC 2 Type 1 compliance, ensuring the highest standards of security, availability, and confidentiality in our services.
What is SOC 2 Compliance?
SOC 2 compliance is a rigorous process that evaluates a company's controls related to security, availability, processing integrity, confidentiality, and privacy. It provides assurance that a service provider securely manages data to protect the interests and privacy of its clients.
Why It Matters to You
When you choose AudioEye, you can trust that your data is in safe hands. Our SOC 2 compliance assures you that we adhere to industry best practices and standards, giving you peace of mind and confidence in our services.
Continuous Improvement
Our journey towards SOC 2 compliance doesn't end with certification. We are dedicated to continuous improvement, regularly reviewing and enhancing our security measures to adapt to evolving threats and technologies.
Learn More
Have questions about our SOC 2 compliance or want to learn more about our services? Contact us today to speak with one of our experts, and visit the AudioEye Trust Center to get an ongoing overview of our security and compliance standards.
Continuous Security Commitment
Penetration Testing
We perform an independent third-party penetration test at least annually to ensure that the security posture of our services is uncompromised.
Security Awareness Training
Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
Roles and Responsibilities
Roles and responsibilities related to our information security program and the protection of our customer’s data are well defined and documented.
Information Security Program
We have an information security program in place that is communicated throughout the organization. Our information security program follows the criteria set forth by ISO 27001 and SOC 2. Please see our trust center for more details.
Continuous Monitoring
We continuously monitor our security and compliance status to ensure there are no lapses.
SOC 2 Compliance
Achieving SOC 2 compliance demonstrates our unwavering commitment to data security and privacy. We have implemented robust processes, controls, and safeguards to protect your sensitive information at every step of the way.