Nintex, provider of process management and automation platforms, announced today an independent, exception-free SOC 2 Type 2 report on security controls for Nintex Workflow Cloud. Customers and partners rely on Nintex for key business processes, so the company leveraged an independent auditing firm to review Nintex internal security processes adherence to SOC 2 requirements. The resulting report demonstrates the safeguards Nintex has put in place for people, processes, and technology.
Nintex is the global standard for process management and automation. Today more than 8,000 public and private sector clients across 90 countries turn to the Nintex Platform to accelerate their digital transformation journeys by enabling them to quickly and easily manage, automate and optimize business processes.
The System and Organization Controls (SOC) report covers Nintex Workflow Cloud and its key functional components: Nintex Workflow and Forms, Nintex DocGen, Nintex Xtensions, and Nintex process analytics.
The report validates the effectiveness of the security controls in Nintex Workflow Cloud, finding no instance in which a security control was not in place or was ineffective. An earlier SOC 2 Type 1 report addressed the design of the security controls in Nintex Workflow Cloud.
“Nintex puts a high priority on earning and retaining the trust of our customers and partners,” said Nintex CEO Eric Johnson. “We build trust into our software and into our company practices, along with high reliability and ease of use. This independent examination is proof that we deliver what we promise.”
The SOC 2 Type 2 audit report is a significant milestone for Nintex Workflow Cloud. It means that enterprises can deploy this leading-edge cloud automation solution with confidence that it meets rigorous, industry-standard criteria for security and risk management developed by the American Institute of Certified Public Accountants.
The favorable result reflects Nintex’s ongoing commitment to ensuring that it carefully protects the information assets of its customers, partners, and end users. Information security is a concern for nearly every organization, but it is especially important for the growing numbers of companies that rely on cloud services and Software-as-a-Service (SaaS) applications.
Customers may learn more about the report or obtain a copy by contacting their Nintex account manager or emailing firstname.lastname@example.org.
Looking for more? Download our Business Process Management Buyer’s Guide for free to compare the top-24 products available on the market with full page vendor profiles, key capabilities, a BPMS market overview, our bottom line analysis, and questions for prospective buyers.
Latest posts by Elizabeth Quirk (see all)
- Choosing the Right BPM Software Vendor - December 27, 2019
- Taking a Closer Look at Mobile BPM - December 25, 2019
- 3 Pillars of Modern Business Process Management Solutions - August 23, 2019