Trust, but verify Trust, but verify

Information Security at EPI-USE Labs

EPI-USE Labs offers innovative cloud platforms for client interaction and management of SAP® landscapes. From the beginning of the design stages, we were mindful of the trust our clients place in us with the security of our data. Accordingly, we’ve implemented best practice information security standards that include technology, processes and people to minimize the risk of security incidents.

EPI-USE Labs adopted the Information Security Management System and controls from ISO/IEC 27001 that govern the management, development and operations of our cloud platforms. To verify the proper implementation and effectiveness of our security controls, we’ve undergone multiple, rigorous independent audits by an accredited certification registrar. Subsequently we have been awarded ISO/IEC 27001 certification and ISAE 3402 / SSAE 16 (SOC 1) Type I assurance reports.

About ISO/IEC 27001

ISO/IEC 27001 is an internationally-recognised information security management standard that ensures organisations can apply a framework to business processes to help identify, manage and reduce risks to data security. The accreditation process considers not only IT but all business operations. To meet the criteria, a company must demonstrate that it has a systematic and ongoing approach in place to manage sensitive company and customer information.

About SOC 1, Type 2

Also known as the Statement on Standards for Attestation Engagements (SSAE) 18, the SOC 1 report focuses on a service organization’s controls that are likely to be relevant to an audit of a user entity’s (customer’s) financial statements. Control objectives are related to both business process and information technology.*

About SOC 2, Type 2

The SOC 2 report addresses a service organization’s controls that relate to operations and compliance, as outlined by the AICPA’s Trust Services criteria in relation to availability, security, processing integrity, confidentiality and privacy. A SOC 2 report includes a detailed description of the service auditor’s test of controls and results.

* Source:

Request Reports