Ermetic Receives SOC 2 Type I Certification

Cloud Infrastructure Entitlement Management (CIEM) Platform Meets the Highest Standards for Security 

PALO ALTO and TEL AVIV, Jan. 13, 2021 – Ermetic, the cloud access risk security company, today announced it has received a System and Organization Controls (SOC) 2 Type I certification for the Ermetic Platform which provides cloud infrastructure entitlement management (CIEM) as a service. This SOC 2 certification report validates the security controls of the Ermetic platform.

AppSec/API Security 2022

“The Ermetic cloud-delivered platform provides cloud infrastructure entitlement management (CIEM) that automates security permission discovery, assessment and remediation on a continuous basis to enforce zero trust access across multi-clouds,” said Michael Dolinksy, CTO of Ermetic. “SOC 2 Type I certification demonstrates to customers that the Ermetic platform meets and exceeds the strictest industry standards for security and trust controls in the cloud.”

An audit conducted by KPMG confirmed that Ermetic met the security Trust Services Criteria established by the American Institute of Certified Public Accountants (AICPA). For more information on SOC 2 Type I certification, visit:

About Ermetic

Ermetic enables enterprises to protect cloud infrastructures (IaaS/PaaS) from access-related risks and misconfigurations by maintaining continuous visibility into identities, their entitlements and data usage. By combining analytics with granular, full stack insight, Ermetic makes it possible to enforce least privilege access at scale even in the most complex cloud environments. The company is led by proven technology entrepreneurs whose previous companies have been acquired by Microsoft, Palo Alto Networks and others. Ermetic has received funding from Accel, Glilot Capital Partners, Norwest Venture Partners and Target Global. Visit us at and follow us on LinkedIn, Twitter and Facebook.

The post Ermetic Receives SOC 2 Type I Certification appeared first on Ermetic.

*** This is a Security Bloggers Network syndicated blog from Ermetic authored by Ermetic Team. Read the original post at: