After months of rigorous evaluation and meticulous preparation, we are proud to announce that AI21 Labs has successfully completed the SOC 2 audit report.
We are thrilled to announce a significant milestone in our journey to provide the best possible service to our valued customers.
After months of rigorous evaluation and meticulous preparation, we are proud to announce that AI21 Labs has successfully completed the SOC 2 audit report .
We understand that trust is the foundation of any successful partnership, and this report serves as a testament to our commitment to safeguarding our clients' data.
What is the SOC 2 report?
SOC 2, which stands for Service Organization Control 2, is a widely recognized and respected report within the technology industry. It is issued by the American Institute of CPAs (AICPA) and assesses a company's controls related to security, availability, processing integrity, confidentiality, and privacy. The SOC 2 report evaluates the effectiveness of a company's systems and procedures in safeguarding customer data and ensuring the availability and reliability of their services.
Why SOC 2 matters
At AI21 Labs, we handle vast amounts of data on behalf of our clients. We understand the importance of ensuring that this data is protected from unauthorized access, disclosure, or alteration. As more enterprises seek to handle business data using LLMs, it is of utmost importance for them to ensure the safety of their data. Every day, our customers shoulder this responsibility, emphasizing the significance of choosing an LLM solution that shares a similar approach towards safeguarding their data.
Benefits of SOC 2 report
AI21 Labs also receives ISO 27001, ISO 27017, and ISO 27018 certifications
As well as successfully completing the SOC 2 report, over the last six months we also achieved ISO 27001, ISO 27017, and ISO 27018 certifications.
The SOC 2 report, in addition to the mentioned certifications, demonstrate our ability to protect customer information from unauthorized access, ensuring the confidentiality, integrity, and availability of their data. Our customers can now have increased trust in our services, knowing that we have undergone rigorous third-party evaluations of our security practices and adhere to industry regulations and compliance standards.