Challenge Customers of HubEngage tend to keep various kinds of personally identifiable information about their employees – like addresses, social security numbers to financial account information – on the platform. To ensure and offer assurance of safe data handling and top-notch SecOps practice, HubEngage decided to undergo an ISO27001 audit and certification. Hiring a compliance consultant…
Challenge StepSecurity started as a company that helped open-source maintainers and communities with their software supply chain security. However, as StepSecurity continued to grow, they started seeing a lot of requests from large enterprise organizations with private repositories that had the same security issues. These organizations were predominantly from regulated industries such as healthcare and…
Challenge Because Ripl works with social media platforms like Facebook, Instagram, Twitter, and Youtube, data security and privacy are top priorities. They must exercise due diligence to protect sensitive information and prove best practices. Every year, Facebook’s security auditors review Ripl’s systems for regular due diligence. These auditors examine system evidence against information in the…
Challenge Recruit CRM captures and processes a variety of data, often sensitive and personally identifiable information (PII) – about the candidates and employers. Given this nature, questions about the platforms’ security makeup and overarching security practices come up in most sales conversations. While Recruit CRM operates security-first and is also GDPR compliant, it was important…
Challenge DNIF plans to expand into western markets and wants to bolster its product offering by proving compliance with standards like SOC 2 and ISO 27001. Although the engineering practice is security-first and there are internal guardrails in place to ensure safe data handling, attestations would prove beneficial in making inroads into markets like the…
Challenge The increase in security misconfiguration incidents for cloud-hosted applications has led to a mounting need for cloud observability platforms. “Every other week you hear about some breach. A poorly configured cloud resource or a vulnerability is often the culprit,” says Parth Shah, co-founder and head of product and engineering at Dassana. “We decided to…