Information Security at EPI-USE Labs
EPI-USE Labs offers innovative cloud platforms for client interaction and management of SAP® landscapes. From the beginning of the design stages, we were mindful of the trust our clients place in us with the security of our data. Accordingly, we’ve implemented best practice information security standards that include technology, processes and people to minimize the risk of security incidents.
EPI-USE Labs adopted the Information Security Management System and controls from ISO/IEC 27001 that govern the management, development and operations of our cloud platforms. To verify the proper implementation and effectiveness of our security controls, we’ve undergone multiple, rigorous independent audits by an accredited certification registrar. Subsequently we have been awarded ISO/IEC 27001 certification, SOC 1 (ISAE 3402) and SOC 2 Type and assurance reports. The last audit was conducted during February 2018.
To request a copy of EPI-USE Labs’ security certifications or audit reports, you can complete the form at the bottom of this page.
About ISO/IEC 27001
ISO/IEC 27001 is an internationally-recognized information security management standard that ensures organizations can apply a framework to business processes to help identify, manage and reduce risks to data security. The accreditation process considers not only IT but all business operations. To meet the criteria, a company must demonstrate that it has a systematic and ongoing approach in place to manage sensitive company and customer information.
About SOC 1, Type 2
Also known as the Statement on Standards for Attestation Engagements (SSAE) 18, the SOC 1 report focuses on a service organization’s controls that are likely to be relevant to an audit of a user entity’s (customer’s) financial statements. Control objectives are related to both business process and information technology.*
About SOC 2, Type 2
The SOC 2 report addresses a service organization’s controls that relate to operations and compliance, as outlined by the AICPA’s Trust Services criteria in relation to availability, security, processing integrity, confidentiality and privacy. A SOC 2 report includes a detailed description of the service auditor’s test of controls and results.