SOC 2 Compliance
SOC 2 is an audit report developed by the American Institute of CPAs (AICPA). The audit evaluates controls related to security, availability, processing integrity, confidentiality, and privacy of a system. There are two types of SOC 2 reports:- Type I: checks if a company is compliant at a point in time.
- Type II: confirms that a company is still compliant during an observation window (typically 6 months).
FAQs
Is Hexus SOC 2 compliant?
Is Hexus SOC 2 compliant?
We are currently in the process of obtaining our SOC 2 certification, with a target completion date of Q3 2024. We have prioritized security from the early stages of our company. We are committed to achieving and maintaining the highest standards of security and compliance.Contact us at [email protected] to request letters from our auditor regarding progress and gap assessment.
How does Hexus protect my data?
How does Hexus protect my data?
We employ a comprehensive set of security measures to safeguard your data:
- All data is encrypted in transit and at rest using industry-standard encryption protocols.
- We follow the principle of least privilege, ensuring that access to data is limited to authorized personnel only.
- Regular security audits and vulnerability assessments are conducted to identify and address any potential risks.
Can I review Hexus' security documentation?
Can I review Hexus' security documentation?
Absolutely. We are happy to share our Vanta trust center with you, which provides detailed information about our security practices and infrastructure. Additionally, we can provide letters from our auditor regarding our SOC 2 certification progress.If you require further documentation, such as our security questionnaire, please reach out to us at [email protected].
How does Hexus handle data privacy?
How does Hexus handle data privacy?
We take data privacy seriously and we have strict policies in place governing the collection, use, and retention of personal data. You can find more details in our Privacy Policy.
Can you answer a questionnaire?
Can you answer a questionnaire?
Yes, you can contact us at [email protected] to get started.
What SSO providers do you support?
What SSO providers do you support?
The SSO integration is compatible with most IdPs and supports both SAML and OIDC protocols.
How can I report a vulnerability?
How can I report a vulnerability?
Contact us at [email protected] to report any incidents.

