Showrunnr Achieves

SOC 2 Type II Certification

Ensuring robust security and reliability lies at the heart of Showrunnr's commitment to excellence in providing project management software tailored for the dynamic world of Film and TV production. From the outset, our focus has been on crafting systems, controls, and processes that prioritize both security and availability. We're thrilled to announce that we've reached a significant milestone in this journey by attaining SOC 2 Type II certification.

The Importance of SOC 2 Type II Certification

SOC 2 stands as a benchmark in information security compliance, meticulously crafted to assess and showcase an organization's cybersecurity measures. Achieving SOC 2 certification entails the establishment of a robust cybersecurity program aligned with the standard's requirements, followed by a comprehensive audit conducted by a certified CPA. During this audit, cybersecurity controls are scrutinized and tested against the stringent SOC 2 criteria, culminating in a detailed report that encapsulates the auditor's observations and findings.

Below are some examples of what you can expect to encounter within the report:

  • Showrunnr's comprehensive security policies
  • Encryption protocols deployed by Showrunnr to secure data at rest and in transit
  • Detailed overview of logical and physical access controls implemented by Showrunnr
  • Insight into Showrunnr's change management process, ensuring systematic and secure updates
  • Strategies and protocols for data backup and disaster recovery devised by Showrunnr
  • Description of Showrunnr's system monitoring setup, including alerts and alarms for timely threat detection
  • Explanation of measures undertaken by Showrunnr to safeguard data privacy and protection

Learn More About SOC 2

A SOC 2 examination provides a comprehensive overview of a service organization's controls pertaining to security, availability, processing integrity, confidentiality, and privacy. Tailored to meet the requirements of diverse stakeholders, these reports offer detailed insights and assurance regarding the security, availability, and processing integrity of the systems employed by the service organization for data processing, as well as the confidentiality and privacy measures in place for the processed information.