Skip to content

Kandji Completes SOC 2 Type 2 Audit

Kandji Completes SOC 2 Type 2 Audit

The Kandji team is proud to announce that we have completed our SOC 2 Type 2 compliance audit. As a device management solution that helps our customers secure their Apple devices and meet compliance regulations, we have always understood that data security is paramount, and have held ourselves to a high standard. This third-party audit is a public declaration that we are committed to following best practices for keeping our customers’ data secure.

What is SOC 2 Type 2?

A Service Organization Control (SOC) 2 Type 2 is recognized as a universal standard for data security. The audit process for SOC 2 Type 2 includes third-party penetration testing and other controls to determine that Kandji’s procedures meet regulations set by the American Institute of CPAs (AICPA). The Type 2 audit ensures these controls were in place and followed for the entire audit period.

What does this mean for our customers?

Security and compliance frameworks exist because the global online ecosystem is evolving rapidly and we need consistent standards for data privacy governance and protection against cybersecurity risks. We are dedicated to following security best practices, through methods including:

  • Encryption of Kandji traffic and data at rest
  • Conducting third-party penetration tests
  • Continuous monitoring of security threats on servers and endpoints
  • Performing risk assessments and disaster recovery tests
  • Strict change management processes
  • Monitored and restricted employee access to production environments


What’s next?

Achieving SOC 2 Type 2 compliance is not a one-time event – we will continue to be audited for SOC 2 Type 2 annually. We look forward to continuing to demonstrate our commitment to your safety by ensuring that our procedures are held to the highest standard.



Recent Articles

Featured image: TIL: How To Keep Bad Apps Out of Your Mac Fleet
Iru Team 1 min read

TIL: How To Keep Bad Apps Out of Your Mac Fleet

Need to stop bad apps from infiltrating your Mac fleet? In this TIL episode, Andy Rana shows how to use Kandji's App Blocking library item to keep unauthorized apps off managed devices. Learn how to spot bad apps, set blocking rules, and see the workflow from setup to end-user experience.

TIL
Featured image: Kandji Referral Program
Iru Team 2 min read

Introducing the Kandji Referral Program

If you’ve ever raved about Kandji to a friend, colleague, or peer, you’re in good company. Our customers can’t help but share it - whether it’s in a Slack community, during a coffee break, or during a “you’ve got to check this out” moment. Those recommendations carry more weight than any ad ever could, because they come from someone who’s been there, done that, and solved the problem.

Inside Iru
Featured image: The Kids Aren’t Alright: A Threat Intel Dad’s View of the Internet
Alex Gartner 4 min read

The Kids Aren’t Alright: A Threat Intel Dad’s View of the Internet

Opinion

See Iru in action

Discover why thousands of teams choose Iru

By submitting this form I agree to Iru’s Privacy Policy and consent to be contacted by Iru about its products and services.

Stay up to date

Iru's weekly collection of articles, videos, and research to keep IT & Security teams ahead of the curve.