Navigate Information Security Compliance with Ease
Auditlytics helps companies achieve SOC2 certification quickly and efficiently.
Contact UsAbout Auditlytics
We help companies navigate the rough terrain of information security compliance project management. Whether you're a startup or have thousands of employees, compliance affects the entire organization. We make security compliance easy by providing the tools and helping customers develop their information security program. Auditlytics focuses on SOC2 readiness and assisting companies in obtaining SSAE18 SOC2 certification as rapidly as possible. We found that companies large and small are confused about how to approach information security compliance. Many seek help from audit firms, but realize that advisory and audit services don't mix. In practice, it's difficult for firms to be truly objective and meet the needs of your business. We're not a cookie-cutter audit firm. We only offer advisory and implementation services helping you focus on getting the most value out of your security compliance program.
Our Services
SOC2 Readiness
We assist companies in obtaining SSAE18 SOC2 certification as rapidly as possible.
Advisory Services
We offer advisory and implementation services to help you focus on getting the most value out of your security compliance program.
Expert Guidance
Our team combines industry-focused and seasoned veterans with operational, IT, and Security knowledge.
MSP Services
Our Managed Service Provider (MSP) solutions deliver end-to-end IT support, enhancing infrastructure, security, and efficiency while reducing complexity and costs to support business growth.
Core SOC2 Processes
Outlined below are the key components of the SSAE18 SOC 2, along with the specific sub-areas that Auditlytics emphasizes to support certification readiness. To learn more about the SOC 2 certification process, please click here.
Control Environment
- Board of Directors
- Background Screening
- Code of Conduct
- Disciplinary Management
- Job Descriptions
- New Hire Management
- Organizational Structure
- Performance Reviews
- Policy Management
- Training
- Termination Management
Communication & Information
- Centralized Logging
- External Customer Communication
- External Support Desk
- External Customer Meetings
- Internal Customer Communication
- Internal Support Desk
- Organization/Certification Membership
- Pertinent Meetings
- Product Guides (Admin/User)
- Whistle Blower Hotline
- Incident Response Process
Risk Management
- Business Impact Assessment
- Risk Identification
- Risk Analysis
- Risk Register/Tracking
- Risk Mitigation
- Vendor Management
Monitoring Activities
- Internal Control Auditing
- Penetration Testing
- Source Code Vulnerability Scanning
- Vulnerability Scanning
Control Activities
- Information Security Officer
- Internal Control Implementation
- Segregation of Duties
- Security Awareness Program
- Security Team
- Security Policies
Logical & Physical Controls
- Antivirus/Malware
- Asset Inventory
- Central Authentication
- Data Handling/Destruction
- Encryption Management
- IT On/Off Boarding
- Mobile Device Management
- Network Restrictions
- Network Segmentation
- Network Topology
- Phyiscal Access Restrictions
- Role Based Access
- Software Management
- USB Media Protection
- VPN
- Visitor Access
- 2FA Authentication
System Operations
- CPU, HDD, Memory Monitoring
- Centralized Logging
- Dataflow Diagrams
- Intrusion Detection
- Incident Response
- Recovery Testing
- SLA Uptime Monitoring
- System Monitoring
- Configuration Management
- Vulnerability Management
Change Management
- Change Monitoring
- Change Tracking
- Software Development Lifecycle
- Software Release Management
Availability
- Capacity Monitoring
- Capacity Forecasting
- Business Continuity Planning
- Disaster Recovery Planning