ComplianceInvoke Consulting USA LLC utilizes enterprise-grade best practices to protect our customers’ data, and works with independent experts to verify its security, privacy, confidentiality, availability and compliance controls, and has achieved PCI DSS and SOC 2 Type 2 reports against stringent standards. |
PCI DSS ROC
The Attestation of Compliance reflects the results of an onsite assessment, which is documented in an accompanying Report on Compliance (ROC). Third party audit is performed yearly. SOC 2 Report We work with an independent auditor Prescient Assurance LLC to maintain a SOC 2 report, which objectively certifies our controls to ensure the continuous security of our customers' data. Developed by the Assurance Services Executive Committee (ASEC) of the AICPA, the Trust Services Criteria is the set of control criteria to be used when evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, or processing integrity of information and systems, or the confidentiality or privacy of the information processed by the systems at an entity, a division, or an operating unit of an entity. Continuous Security Control Monitoring Invoke Consulting USA LLC uses Drata’s automation platform to continuously monitor 100+ security controls across the organization. Automated alerts and evidence collection allows Invoke Consulting USA LLC to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organization. Employee Trainings Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data. Penetration Tests Invoke Consulting USA LLC works with industry leading security firms to perform annual network and application layer penetration tests. Secure Software Development Invoke Consulting USA LLC utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle. Data Encryption Data is encrypted both in-transit using TLS and at rest. |
Our Offices
|
Mexico |
SpainCalle Jose Luis Perez Pujadas 8, Edificio Forum,
Of: B44, Granada (18006) Spain Tel: +34 858 800 059 [email protected] |
India |