Vectice Obtains SOC2 Type II Certification

San Francisco, CA - October 20, 2022. We are excited to announce that Vectice has successfully completed a SOC 2 (Type II) audit. This is big news, because we want to build software that our users can trust. SOC 2 (Type II) is an independent audit that reviews our security controls over a period months. Vectice obtained a clear score and we’re happy to share the result!

What is SOC 2 Type II?

Developed by the American Institute of Certified Public Accountants (AICPA), the SOC 2 (System and Organization Controls) is an independent, third-party audit built for service companies that examines the controls in place for s​​ecurity, privacy and integrity of their systems that process user data. This happens by observing these controls over a period of time (typically lasting several months), after which the auditing party decides if they satisfy the SOC criteria. Vectice’s SOC 2 (Type II) report didn’t have any anomalies or exceptions and we were awarded with a clean audit score.‍

Why Does This Matter?

SOC 2 (Type II) is an industry-standard that is widely recognized as a label of trust. This audit is performed by external firms that use standard metrics around security and privacy. This is particularly important with cloud technologies, where extra measures need to be installed to securely store and transfer data.

SOC 2 (Type I) is a shorter audit that creates a description of the security controls in place, but (Type II) is an observation of these controls over time. Since it’s more detailed and extensive, Type II takes longer to complete. We chose SOC 2 (Type II) because we value our users and want to prove that our software is reliable and trustworthy.

At Vectice, we are committed to building a secure platform that our users can trust. We want to guarantee that your sensitive data is handled carefully, so your team can focus on delivering impactful data science and machine learning projects. Vectice is built with compliance in mind, so you can integrate our software with your stack in a safe and secure way.

Back to Blog