Data Protection and Security - DoubleVerify
image

A Foundation of Security and Trust

____

Trust is the foundation of its customer and partner relationships and a core value of our business. To build trust in DoubleVerify’s services, we have made information security and protection a strategic priority. We maintain policies and standards that are aligned or exceed legal, privacy, and industry compliance requirements, as well as widely accepted information security and governance frameworks. Our controls conform to the AICPA Trust Services Criteria, which are independently validated and attested via our SOC2 Type 2 report.

image

Data Protection and Security

DoubleVerify believes trust is the foundation of its customer and partner relationships and a core value of our business. To build trust in DoubleVerify’s services, we have made information security and protection a strategic priority. We have implemented multi-layered organizational, technical, and administrative measures which we continuously advance and proactively invest in. We have a mature information security program, inclusive of a dedicated team of cybersecurity experts, with access to industry-leading tools, facilities and executive leadership support.  

DoubleVerify’s systems and processes safeguard information assets and ensure service continuity and reliability. Security design and testing are integrated throughout the product development lifecycle. Cross-functional teams are trained and empowered to proactively assess risk and ensure that security controls are built-in prior to deployment. Our teams rely on leading automated solutions and best practices to identify and manage vulnerabilities, patch code, track migrations and ensure ongoing security. 

DoubleVerify’s state-of-the-art Security Operations Center monitors system activities, provides alerts, and responds in real-time, allowing our teams to strategically deploy resources to address and mitigate risks. System access is strictly controlled, and a wide range of top security technologies are implemented to protect the network, systems, applications, and data – including user provisioning, strong authentication, firewalls, encryption, malware protection, penetration testing, configuration management, threat modeling and threat intelligence.

Resiliency and redundancy are critical to all DoubleVerify systems and services, ensuring ongoing reliability and availability. We maintain policies and standards that are aligned or exceed legal, privacy, and industry compliance requirements, as well as widely accepted information security and governance frameworks. Our controls conform to the AICPA Trust Services Criteria, which are independently validated and attested via our SOC2 Type 2 report. 

If you are an existing DoubleVerify customer and would like to learn more about DoubleVerify’s information security program please contact your Account Manager. Otherwise, please contact us to learn more.