Security Commitment

Last Revised: April 11, 2024

At AudioEye, we hold the highest regard for security and privacy. Safeguarding the data we handle, including the personal information of our customers, has always been and will always be our top-most priority. We believe in an unwavering dedication to ensure a secure and compliant environment is reflected in every aspect of our operations, from our structural framework to our educational pursuits and even our recruitment process.

Data Protection and Privacy

Availability

We build highly available products that service various monitoring and observability needs for our customers. We adhere to our service level agreements (SLAs) of 99.99% availability.

Product Security

Product security is of paramount importance at AudioEye. We incorporate security into the design of our products from the beginning stages of our software development lifecycle. 

Patch Management

AudioEye releases software patches as part of our continuous integration process. We strive to ensure patches that can impact end users are applied as soon as possible and within our established service level agreements (SLA) by sending end user notifications and scheduling service windows.

Vendor Management

AudioEye leverages a number of third party applications and services in support of the delivery of our products to our customers. The AudioEye Security Team recognizes that the company’s information assets and vendor dependencies are critical to our continuing operations and delivery of services. As such, AudioEye’s Security and Privacy teams have established a vendor management program that sets forth the requirements to be established and agreed upon when AudioEye engages with third parties or external vendors. These engagements are designed to assess the technical, physical, and administrative controls in place and to ensure they are commensurate with the expectations of AudioEye and its customers. For a complete list of AudioEye’s subprocessors, please visit https://audioeye.com/subprocessors/

AudioEye’s Service and Organization Controls (SOC) 2 Type 1 Compliance

Ensuring Trust and Security: Our SOC 2 Compliance

At AudioEye, safeguarding your data and ensuring the highest standards of security is our top priority. That’s why our company proudly maintains SOC 2 Type 1 compliance, ensuring the highest standards of security, availability, and confidentiality in our services.

What is SOC 2 Compliance?

SOC 2 compliance is a rigorous process that evaluates a company's controls related to security, availability, processing integrity, confidentiality, and privacy. It provides assurance that a service provider securely manages data to protect the interests and privacy of its clients.

Why It Matters to You

When you choose AudioEye, you can trust that your data is in safe hands. Our SOC 2 compliance assures you that we adhere to industry best practices and standards, giving you peace of mind and confidence in our services.

Continuous Improvement

Our journey towards SOC 2 compliance doesn't end with certification. We are dedicated to continuous improvement, regularly reviewing and enhancing our security measures to adapt to evolving threats and technologies.

Learn More

Have questions about our SOC 2 compliance or want to learn more about our services? Contact us today to speak with one of our experts, and visit the AudioEye Trust Center to get an ongoing overview of our security and compliance standards.

Continuous Security Commitment

  • Penetration Testing

    We perform an independent third-party penetration test at least annually to ensure that the security posture of our services is uncompromised.

  • Security Awareness Training

    Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.

  • Roles and Responsibilities

    Roles and responsibilities related to our information security program and the protection of our customer’s data are well defined and documented.

  • Information Security Program

    We have an information security program in place that is communicated throughout the organization. Our information security program follows the criteria set forth by ISO 27001 and SOC 2. Please see our trust center for more details.

  • Continuous Monitoring

    We continuously monitor our security and compliance status to ensure there are no lapses.

  • SOC 2 Compliance

    Achieving SOC 2 compliance demonstrates our unwavering commitment to data security and privacy. We have implemented robust processes, controls, and safeguards to protect your sensitive information at every step of the way.