At Lansweeper, a core belief is that visibility is fundamental for protecting your technology assets. You can't protect what you can't see, so we strive to help you maintain complete visibility across your technology asset estate at all times. However, as customers, you've also entrusted us with your business information, and we are committed to protecting that information with the highest-quality protections and processes. We understand that you expect us to protect your data with the highest standards, and provide highly secure and reliable software.
To that end, we are proud to announce that we have just released our latest SOC 2 attestation report, updating the report from 2021. Dedicated to our cloud platform, the 2022 SOC 2 Report confirms our robust security program and demonstrates that we have adequate security processes in place to continue to protect your data. The primary focus of the attestation reports are the Cloud Platform and Credential-free Device Recognition. Although not part of the report, the majority of the processes and controls are also implemented for the on-premises product, including the Relay Service used by LsAgent.
What's In the Report?
SOC, short for System and Organization Controls, was developed by the American Institute of Certified Public Accountants (AICPA) as a reporting framework for systematically evaluating third-party service providers such as Lansweeper. Our SOC 2 report focuses on Lansweeper's systems and controls as they relate to security and demonstrates we have adequately designed our processes and controls to meet those high standards.
As part of our commitment to meeting the most rigorous security, availability and confidentiality standards in the industry, Lansweeper undergoes an annual SOC 2 Type II audit. We enlist an independent third-party auditor to verify and confirm that our security program is in accordance with the AICPA Trust Services Principles and Criteria. Specifically, the report:
- Verifies that our security controls are designed appropriately, were in operation on a specified date, and were operating effectively over a specified time period.
- Contains a clear description of our Cloud platform, the supporting organization, and the processes we have installed at Lansweeper, as well as the individual controls that support us in safeguarding your information.
- Define eight different processes and over 30 individual controls responding to your expectations and needs in terms of cybersecurity.
This year we extended the scope of our SOC 2 Report to include not only the cloud platform but also Fing NRE, as the technology is used to deliver Lansweeper's credential-free device recognition capabilities.
Why Is Security So Important at Lansweeper?
Increasingly, customers are moving to our cloud platform, which means they're sharing their data with us. They don't do this blindly; security and trustworthiness are a critical consideration before they make the move to the cloud. We expect that customer security requirements will only increase over time, so implementing a rock-solid security program is a critical step to supporting customers in their transition. Moreover, we intend to practice what we preach - as we help organizations uncover and mitigate security risks in their infrastructure, we must also ensure that our own infrastructure is reliable, trustworthy and free of vulnerabilities.
We are committed to pursuing consecutive SOC 2 reports and additional compliance standards. We'll also continue to identify opportunities for adjusting the scope and approach based on your feedback. Thank you for your continued business and support!