Lendmarx achieves SOC 2 Type II compliance

LendmarX Achieves SOC 2 Type II Compliance: Demonstrating the Effectiveness of Our Security Controls

LendmarX is excited to announce that we have successfully completed our SOC 2 Type II audit—a significant achievement that strengthens our commitment to data security, privacy, and operational excellence.

 

This certification goes beyond SOC 2 Type I. While Type I assessed the design of our security controls at a single point in time, SOC 2 Type II evaluates how effectively those controls perform over an extended period. This means our security practices are not only well-designed—they’re consistently followed in our day-to-day operations.

 

 

An independent third-party auditor conducted a thorough review of our systems, processes, and controls. The audit focused on the five Trust Services Criteria:

  • Security: Ensuring protection against unauthorized access and system misuse.

  • Availability: Verifying that our systems remain reliable and accessible to customers.

  • Processing Integrity: Confirming the accuracy and completeness of data processing.

  • Confidentiality: Maintaining safeguards around sensitive and proprietary information.

  • Privacy: Handling personal information responsibly and in accordance with leading privacy standards.

 

 

 

  •  

Why It Matters

Achieving SOC 2 Type II compliance is a powerful signal to our clients and partners. It proves that the systems we’ve put in place are operating exactly as intended. As a result, our customers can trust that their data is being handled securely, reliably, and with integrity.

 

This certification reflects our core values: transparency, accountability, and continuous improvement. For example, we’re constantly reviewing and enhancing our internal controls to stay ahead of evolving threats.

 
 

 

What’s Next for LendmarX?

Security is not a one-time project—it’s a continuous journey. We will keep investing in new technologies and updating our compliance efforts to ensure we meet the highest standards.

 

We encourage you to visit our Trust Center to explore the tools, policies, and frameworks we use to protect your data. You can also learn more about SOC 2 by visiting https://www.aicpa.org/soc4so.