Skip to main content
News

i2 Group Achieve SOC 2 Type 2 Compliance for Security, Availability and Confidentiality.

i2 Group, a leading provider of link analysis software worldwide, is excited to announce that earlier this year, its i2 Online platform successfully completed the American Institute of Certified Public Accountants (AICPA) SOC 2 Type 2 compliance for security, availability, and confidentiality.

AICPA SOC logo

This assessment further underscores i2's dedication to maintaining top-tier standards in protecting customer data. This globally recognized benchmark, conducted by Schellman & Company, has been attained for our i2 Online platform, enabling data analysts to seamlessly access external data sources directly from i2® Analyst’s Notebook®.

This achievement ensures that our customers and the data providers linked to i2 Online can have confidence in our effective systems and controls for securely managing their data.

 

I2 Product Manager, Ryan Hoover, said:

“We are thrilled by the news that i2 Group has achieved SOC-2 Type 2 compliance. Receiving SOC-2 isn't just about meeting industry standards - it's a testament to our unwavering commitment to safeguarding customer data in our SaaS products. It ensures that sensitive customer data is fortified with the highest level of security and trust, providing peace of mind for our customers in knowing that their information is protected with the utmost diligence and care.”

 

What is SOC 2 Type 2

SOC 2 reports help organizations prove their information security controls based on five Trust Services Criteria (TSC): security, availability, processing integrity, confidentiality, and privacy. The Type II report assesses the operating effectiveness of your internal controls over a period of time, typically 3-12 months. SOC 2 Type II audits require a greater investment of both time and resources.

Why SOC 2 Matters

As data breaches and cyber threats continue to rise, safeguarding sensitive information has become paramount for businesses and individuals alike. SOC 2 compliance is a powerful assurance for our customers that i2 Online adheres to the most stringent data protection practices.

i2 Online was assessed in the following categories:

1. Security: SOC 2 scrutinized the effectiveness of our security measures, ensuring that customer data is fortified against unauthorized access, both physically and virtually. Your information is our top priority, and this certification validates our unwavering commitment to keeping your data safe from potential threats.

2. Availability: We understand the significance of uninterrupted services to our customers. SOC 2 evaluated our system's availability, ensuring that our software is accessible whenever you need it. You can confidently rely on i2 Online to deliver the exceptional performance you expect and deserve.

3. Confidentiality: Your trust is invaluable to us, and SOC 2 certification emphasizes our dedication to maintaining the confidentiality of your data. Our secure environment guarantees that sensitive information is handled with the utmost discretion and privacy.

i2 Online

In rapidly evolving, intricate threat landscapes, analysts and investigators demand timely data access. i2 Online tackles this challenge by seamlessly integrating i2® Analyst’s Notebook® with trusted data sources, enhancing analysis and enhancing investigation results. It’s user-friendly, and i2 offers and manages the data connectors on your behalf. This eliminates the need for users to invest time in developing, setting up, or maintaining links to selected data sources. We handle all of this for you. Harnessing the capabilities of i2 Online is as straightforward as launching the application, logging in, and searching public records, social media, open-source intelligence, and beyond.

 

About i2 Group

i2 Group is a world-leader in intelligence analysis software. We empower intelligence analysts and investigators to discover, create, and disseminate actionable intelligence to identify the perpetrators of criminal activity. Founded in Cambridge, UK in 1990, we have more than 30 years’ experience in helping our users to solve complex problems. Our products have been proven in countless real-world operations and are relied upon by 35,000+ users in more than 140 countries.