White papers cybersecurity bluevoyant

A secure environment for your data

BlueVoyant clients enjoy the peace of mind that comes with trusting a world-class cybersecurity team with industry-standard security controls.

We hold ourselves to the highest standards and have implemented company policies that help ensure the security of your data.

You can learn more about our Security Program and Capabilities by contacting a representative from our team at [email protected] who can address your security questions or concerns.

Request more information regarding our InfoSec Program Overview, Policy Summaries, Recent Penetration Test Summary, and more.

Aicpa soc

Security Standards and Privacy

Keeping your data safe and secure is part of normal operations with BlueVoyant.

Our managed security services are designed and delivered with a commitment to data privacy and protection.

Our architecture is built on the principles of privacy by design.

We use technical controls to classify private information, ensuring it’s appropriately handled, encrypted, and if not needed for security operations, uningested in the first place.

SOC Type II Compliant

We meet the defined criteria for managing customer data based on the “Trust Service Principles Criteria and Illustrations.”

The American Institute of Certified Public Accountants (AICPA) evaluates an enterprise’s information systems that are relevant to security and availability. SOC 2 Type II reports on various organizational controls related to security, availability, processing integrity, confidentiality and privacy.

Policies and Standards

Our Functional Assessments allow you to target specific aspects of your security program. We evaluate granular areas like cloud security performance, fraud risk, security stacks and more.

  • Application Development Security

  • Asset Management Enforcement

  • Business Continuity

  • Data Security and Information Lifecycle Management

  • Encryption and Key Management

  • Identity and Access Management Policy

  • Incident Management, E-Discovery and Cloud Forensics

  • Threat and Vulnerability Management Policy