Challenge Since launching in the US in 2020, Fyle has significantly grown its customers and partner network. The real ask for SOC 2 came from customers and partners. As IT expanded its operations and moved upmarket, Fyle increasingly came across enterprises and partners that preferred SOC 2 compliant technology providers. “We realized that while data security…
Challenge Because it works with large companies and major institutions like banks, security due diligence is a standard event at HackerRank. And requests for filling out security questionnaires are a common ask. But the process of completing them is long drawn out, time-consuming, and eats into their engineering teams’ bandwidth. HackerRank needed a solution that…
Challenge Bratish Goswami, Co-founder and CTO at ZapScale, is familiar with the general way of audits. “I know firsthand just how extensive and exhausting they can be,” he notes. In the company he founded (and later sold) before ZapScale, Bratish recollects having done this multiple times, for multiple stakeholders – investors included. “We spent over…
Challenge Building a path to observability demands scanning production systems in great depth and detail – a process singularly dependent on effective tracing and tracking of, among others, infrastructure, code, and system logs. For information this cardinal and critical in nature, Zipy has defaulted to data security from Day 1. “We practice security in all…