Achieve infosec compliance without the headaches
Manage your risk and maintain compliance with ease
Evidence requests, questionnaires, penetration tests, all-in-one
Meet your auditor on day 1 and eliminate any surprises
Connect to the tools that matter most for your audit
See how our automated platform provides more than just readiness through clear roadmaps, transparent communication, and in-app audits
Get the recording icon-arrow
Stand out in a highly regulated industry
Minimize your risk while maximizing returns
Safeguard your data and close more deals
A bespoke solution for your unique business
Steve Heilenman | CIO, Benefix
Read More icon-arrow
Financial data security without the stress
Efficient SOC 2 compliance with no surprises
Enhance your security posture and build trust worldwide
Stay on top of data privacy regulations
Secure transactions,no matter your scale
Protect patient health data with confidence
Stand out in highly regulated industries
Many more standards including custom frameworks
Josh Horowitz | CTO, Stylo
Explore more success stories icon-arrow
Find out why the OrO Way is the best way to do compliance
See how we drive better outcomes through compliance
Go beyond readiness with unmatched expertise
Ensuring compliance is never a blocker to innovation
Join the team that's reimagining compliance
Let's make compliance easier—together
Your team of compliance experts is standing by. Meet your auditor on day 1 and get answers when you need them.
Get to know them icon-arrow
Catch up on the latest industry trends and expert insights
Attend the latest webinar or meet with us in person
Actionable tools for your compliance journey
Expert-curated resources for your compliance journey
A podcast for B2B CISOs
Customize and download your free information security policy and be well on your way to SOC 2 compliance.
Use our policy generator icon-arrow
Customer Stories / Cinchy
Cinchy builds data-centric solutions that make integration obsolete. By fundamentally changing the way data works, Cinchy eliminates countless copies of data and restores data access control. The team accelerates the delivery of new technology projects for global businesses, saving millions in development costs while addressing the root causes of data fragmentation and insecurity.
Rather than transferring or copying data in order to share it, or even worse so, creating data silos, Cinchy’s data fabric platform allows businesses to collaborate in real-time, sharing controlled access to original sources. Ultimately, they empower businesses to take control of their data.
With data at the heart, Cinchy needed a dedicated security team to help promote a new era of collaboration and data exchange among devices, applications, and people.
When searching for a solution, Cinchy leveraged Thoropass’s (formerly Laika) compliance experts to achieve an ISO 27001 certification and further extend their security posture through a SOC 2 report.
Thoropass’s compliance experts conducted gap, risk, and readiness assessments and crafted a tailored task list to achieve ISO 27001 and SOC 2 compliance. The team powered through the audit while Thoropass fielded customer security questions.
Thoropass’s team was also able to complete the initial internal audit required for ISO 27001, preventing Cinchy from hiring an additional outside resource. With Thoropass, Cinchy moved quickly through ISO 27001, followed by SOC 2 Type 2. Thoropass guided Cinchy through a step-by-step tasks list and helped implement all the best practices. Because ISO 27001 and SOC 2 overlap, Thoropass automatically applied ISO 27001 controls to SOC 2, cutting down 75% of the time required to implement both.
“Thoropass has a really clear way of seeing all our big objectives and tasks. It helped me understand the bigger picture and what exact documents we needed to upload as evidence. That was a really helpful piece of Thoropass,” said Saskia Bec.
Cinchy’s ISO 27001 audit process was completed in four weeks while their SOC 2 audit lasted two weeks. While the audits were the latest milestone in their compliance roadmap, Cinchy’s promise to ensure security doesn’t stop there. Their dedication to maintain a secure compliance posture and scale it as they grow reflects their commitment to empowering data independence.
According to Saskia, “For the past month, we’ve told our customers we’re in the process of getting our SOC 2 and ISO 27001 – having the reports in our hands alleviates any concern from our customers.”
Cinchy’s core values of data centricity and autonomous data translate directly into their commitment to keeping their customers’ information safe and secure.
Talk with one of our experts to build your custom path to compliance and take advantage of Thoropass’s thoughtful automation, expert guidance, and security audit experience.
SOC 2