Pocus is SOC 2 Type 2 compliant

Learn more about our data privacy and security policies

Isaac Pohl-Zaretsky
April 14, 2022
Pocus is SOC 2 Type 2 compliant

We’ve taken data and privacy seriously since day one at Pocus, which is why we’re excited to announce that Pocus is SOC 2 Type 2 compliant. 

While many companies wait until their series B or even later rounds to invest time into certifying security efforts, we felt the need to address this early so all customers felt safe sharing their critical product usage and customer data with Pocus. 

Our team has not only met the requirements for SOC 2 type 2, we have also invested resources into building our own unique data privacy architecture. 

Secure by design 

Keeping data safe has never been more important. 

Hackers in recent years have gained access to vulnerable systems from cities to Fortune 500 companies. 

Our Product-Led Sales platform has the highest data privacy and security architecture in place for those very reasons. By making this foundational to our product, we’ve embedded a strong culture around data privacy and security first. Security is a central tenant not just of our product but the entire company culture. Every new hire on the Pocus team goes through security training and all company devices are secured. 

What is SOC 2 and why is it important?

SOC 2 defines criteria for safely managing data according to 5 key trust principles: security, availability, processing integrity, confidentiality, and privacy. A SOC 2 report is unique to each organization and outlines how a vendor manages your data. 

There are two types of SOC 2 reports (Pocus has completed both audits)

  1. Type 1 describes a vendor’s systems and if the design meets the relevant trust principles.
  2. Type 2 can only be achieved once those designs are put into action and the operational effectiveness of the design meets the standard.

A SOC 2 Type 2 report is an important part of any software vendor evaluation where the vendor will have access to any critical data or if important information is being stored in the vendor's environment. 

At Pocus, we enable GTM teams to get access to product and customer data in a single pane of glass view. To do this we need access to the sources of that data, typically a data warehouse like Snowflake, BigQuery or Redshift, and their CRM. Giving access to critical data about product usage and customers can make many data security and IT teams nervous, which is why SOC 2 compliance ensures your vendor will keep that data safe and secure. 

How does Pocus protect data privacy?

We’ve built a unique approach to working with your product and customer data at Pocus. We support multiple deployment options to suit customers' data privacy preferences. Depending on the approach taken, customers can limit the amount of PII exposed to Pocus’ cloud.

Other security and compliance measures we take include:

  • Encryption: Data in transit is encrypted at all times, all storage systems are encrypted, and all Pocus servers are tightly access controlled and audited regularly. When debugging is required a small number of engineers are given access on their encrypted devices and are required to remove any data off their device when work is complete. 
  • Multi-factor authentication required: Access to all critical systems and production environments is protected using strong passwords and multi-factor authentication. Where possible, SSO is used for centralized access control. Access is reviewed prior to being granted and then periodically thereafter.
  • Limited data access: Pocus only extracts metadata, primary keys, aggregate statistics, and limited PII with your permission. You can restrict access to any data field by simply marking it as PII in your Pocus workspace settings. 
  • Pen testing: Pocus underwent a successful pen test from a third party to validate the security of our platform. 

To help us reach this milestone and continue to safeguard our customer’s data, we worked with the awesome folks over at Vanta to help us set up the best processes and security systems. Vanta made the process very easy and we highly recommend them to other early-stage companies looking for a trusted partner. 

Want to learn more?

Curious about Pocus’ Product-Led Sale platform and our approach to data privacy & security? Sign up for our waitlist and we’ll be in touch soon.

About the author
Isaac Pohl-Zaretsky
CTO & Co-founder @ Pocus
Keep Reading
How Hex reached $10M in PLS pipeline with Pocus playbooks

Learn how Hex uses Pocus to drive pipeline and run effective sales playbooks.

Meredith McManus
July 22, 2024
Decoding intent signals with Angelica Ismailos (Vercel)

Learn how Angelica thinks about intent, signals, and marketing’s role in building pipeline.

Meredith McManus
July 2, 2024
Introducing Pocus’ Signal Marketplace

Making it easier than ever to find and action all of the most important signals for your GTM team in one place.

Meredith McManus
June 25, 2024
How Superhuman moved upmarket with Pocus playbooks

Learn about how Superhuman was able to navigate moving upmarket through data-backed playbooks.

Meredith McManus
June 18, 2024

See the magic for yourself

Watch how Pocus makes it easy to
drive conversion, retention, and optimization.

The Revenue Data Platform for go-to-market teams
Schedule a call with a GTM specialist to talk about your GTM motion, goals, and how Pocus can help turn product data into revenue.
Join the #1 place to learn about PLS and modern go-to-market strategy
Join our invite-only Slack community to learn firsthand from experts who have built and scaled hybrid revenue engines and connect with peers who are just figuring things out.
See how Pocus combines product usage and customer data to get a 360° view of your hottest opportunities.
Take the product tour