At Refined, security has always been a top priority. We know that protecting your data is critical, and we take that responsibility seriously. That’s why we’re excited to share that we’ve achieved SOC 2 Type II compliance, a milestone that demonstrates our commitment to the highest security standards.
SOC 2 Type II is an independent, third-party audit that evaluates a company’s ability to securely manage customer data over a defined period. SOC 2 compliance is crucial – it signals a commitment to security, operational excellence, and compliance with industry best practices.
On an organizational level, the SOC2 audit is a great way to identify potential gaps in practices, to ensure that all employees are aware of processes, best practices and their responsibilities.
Our customers rely on our cloud-based products to host and run thousands of mission-critical sites. As a customer of Refined, SOC 2 Type II compliance means that:
Your data is safeguarded by industry-leading security controls.
Our systems are designed to maintain high availability and uptime.
Organizations with strict security requirements (e.g., regulated industries) can confidently adopt Refined, knowing we meet rigorous compliance standards.
We adhere to stringent security best practices, reducing risk and ensuring business continuity.
It simplifies the vendor approval and security reviews done by our customers before purchasing through Refined.
Our SOC 2 Type II compliance covers the following Refined products:
Achieving SOC 2 Type II compliance is an important step for us, but it’s not the final one. We’re already looking at ISO27001 and potentially HIPAA – and we’re continuously gathering feedback from our customers to understand what needs they may have.
One thing is certain – Refined’s commitment to security doesn’t stop here. As security is never a one-and-done process, we’re continuously evolving our practices to stay ahead of emerging threats and industry standards. Achieving SOC 2 Type II compliance is one of those steps; we also run a bug bounty program, inviting security researchers to identify and report vulnerabilities before they become risks. This is just one of the ways we ensure ongoing protection for our customers.
We appreciate the trust you place in us, and we’re always here to answer any questions you may have about our security measures.
Visit our Trust Center for more information.
Raj - Refined
Manager, Scaled Programs
Refined
Sweden
5 accepted answers
1 comment