{"id":14610,"date":"2022-06-21T06:42:14","date_gmt":"2022-06-21T04:42:14","guid":{"rendered":"https:\/\/mike.atsas.gr\/m%ce%b5-%cf%80%ce%b9%cf%83%cf%84%ce%bf%cf%80%ce%bf%ce%af%ce%b7%cf%83%ce%b7-soc2-%cf%83%cf%84%ce%bf-%ce%b5%ce%be%ce%ae%cf%82-%ce%bf%ce%b9-%cf%85%cf%80%ce%b7%cf%81%ce%b5%cf%83%ce%af%ce%b5%cf%82-cybersec\/"},"modified":"2022-06-21T06:42:14","modified_gmt":"2022-06-21T04:42:14","slug":"m%ce%b5-%cf%80%ce%b9%cf%83%cf%84%ce%bf%cf%80%ce%bf%ce%af%ce%b7%cf%83%ce%b7-soc2-%cf%83%cf%84%ce%bf-%ce%b5%ce%be%ce%ae%cf%82-%ce%bf%ce%b9-%cf%85%cf%80%ce%b7%cf%81%ce%b5%cf%83%ce%af%ce%b5%cf%82-cybersec","status":"publish","type":"post","link":"https:\/\/mike.atsas.gr\/en\/m%ce%b5-%cf%80%ce%b9%cf%83%cf%84%ce%bf%cf%80%ce%bf%ce%af%ce%b7%cf%83%ce%b7-soc2-%cf%83%cf%84%ce%bf-%ce%b5%ce%be%ce%ae%cf%82-%ce%bf%ce%b9-%cf%85%cf%80%ce%b7%cf%81%ce%b5%cf%83%ce%af%ce%b5%cf%82-cybersec\/","title":{"rendered":"Odyssey's cybersecurity services with SOC2 certification from now on"},"content":{"rendered":"<p><\/p>\n<div>\n<p>Odyssey has announced the successful completion of the System and Organization Controls 2 (SOC2) - Type 2 security certification, which defines the criteria in customer data management, leveraging five key principles of trust in the services provided: Security, Availability, Processing Integrity, Confidentiality and Privacy.<\/p>\n<p>In this way, the leading reliability of Odyssey's Managed Security services and ClearSkies\u2122 Threat &amp; Vulnerability Management (TVMP) SaaS platform is validated.<\/p>\n<p><strong>Security and operational resilience a priority<\/strong><br>According to Irena Selia, Head of Global Development, ClearSkies Threat &amp; Vulnerability Management (TVMP) at Odyssey, \"SOC2 certification proves that our dedication to managing our customers' data with absolute Confidentiality, Transparency and Availability is a key priority for Odyssey.\" <\/p>\n<p>This development comes just a few weeks after Odyssey was awarded \"Cyber Security Services Provider of the Year\" at the Greek Cyber Security Awards 2022.<\/p>\n<p>These awards highlight Odyssey's dedication -for 20 years- to the development and implementation of innovative technologies for cybersecurity and cyber resilience of businesses.<br>The SOC2 Report is available upon request to all customers (active and potential) and to Odyssey's partners in general.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Odyssey SOC2, M\u03b5 \u03c0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 SOC2 \u03c3\u03c4\u03bf \u03b5\u03be\u03ae\u03c2 \u03bf\u03b9 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 cybersecurity \u03c4\u03b7\u03c2 Odyssey\" width=\"1201\" height=\"631\" class=\"alignnone size-full wp-image-386549\" srcset=\"https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2.jpg 1201w, https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2-1000x525.jpg 1000w, https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2-1024x538.jpg 1024w, https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2-768x404.jpg 768w\" data-lazy-sizes=\"(max-width: 1201px) 100vw, 1201px\" src=\"https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/%CE%A0%CE%B9%CF%83%CF%84%CE%BF%CF%80%CE%BF%CE%AF%CE%B7%CF%83%CE%B7-SOC2.jpg\"><\/p>\n<p><\/p><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/%CE%A0%CE%B9%CF%83%CF%84%CE%BF%CF%80%CE%BF%CE%AF%CE%B7%CF%83%CE%B7-SOC2.jpg\" alt=\"Odyssey SOC2, M\u03b5 \u03c0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 SOC2 \u03c3\u03c4\u03bf \u03b5\u03be\u03ae\u03c2 \u03bf\u03b9 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 cybersecurity \u03c4\u03b7\u03c2 Odyssey\" width=\"1201\" height=\"631\" class=\"alignnone size-full wp-image-386549\" srcset=\"https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2.jpg 1201w, https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2-1000x525.jpg 1000w, https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2-1024x538.jpg 1024w, https:\/\/techblog.gr\/wp-content\/uploads\/2022\/06\/\u03a0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7-SOC2-768x404.jpg 768w\" sizes=\"auto, (max-width: 1201px) 100vw, 1201px\"><\/noscript>\n<p><strong>About Odyssey<\/strong><br>Founded in 2002, Odyssey has been a leader in Cloud &amp; Information Security, supporting organizations worldwide in their efforts to achieve cyber resilience.<br>Odyssey's integrated approach provides solutions that enable organizations to anticipate, respond, recover quickly and adapt to emerging threats and vulnerabilities within the expanding and unpredictable threat landscape.<\/p>\n<p>Odyssey has developed its award-winning ClearSkies\u2122 Threat &amp; Vulnerability Management platform, which correlates threats with emerging vulnerabilities, in real-time, to provide Extended Detection &amp; Response capabilities through Security Orchestration, Automation &amp; Response.<\/p>\n<p>The company is ISO 27001, ISO 9001:2015 and ISO 22301:2019 certified, and accredited by the Payment Card Industry Security Standards Council (PCI SSC) as a Qualified Security Assessor (QSA). Odyssey is honored to be recognized as a Great Place to Work\u00ae, an assessment methodology used by The Fortune 100 Best Companies to Work in America.<\/p>\n<p><strong>Press release<\/strong><\/p>\n<\/div>\n<p><a href=\"https:\/\/techblog.gr\/b2b\/me-pistopoiisi-soc2-exis-oi-ypiresies-cybersecurity-tis-odyssey\/\" rel=\"nofollow noopener\" aria-label=\"Icon\" target=\"_blank\">Source : <\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u0397 Odyssey \u03b1\u03bd\u03b1\u03ba\u03bf\u03af\u03bd\u03c9\u03c3\u03b5 \u03c4\u03b7\u03bd \u03b5\u03c0\u03b9\u03c4\u03c5\u03c7\u03ae \u03bf\u03bb\u03bf\u03ba\u03bb\u03ae\u03c1\u03c9\u03c3\u03b7 \u03c4\u03b7\u03c2 \u03c0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7\u03c2 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 System and Organization Controls 2 (SOC2) \u2013 Type 2, \u03b7 \u03bf\u03c0\u03bf\u03af\u03b1 \u03ba\u03b1\u03b8\u03bf\u03c1\u03af\u03b6\u03b5\u03b9 \u03c4\u03b1 \u03ba\u03c1\u03b9\u03c4\u03ae\u03c1\u03b9\u03b1 \u03c3\u03c4\u03b7 \u03b4\u03b9\u03b1\u03c7\u03b5\u03af\u03c1\u03b9\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd \u03c4\u03c9\u03bd \u03c0\u03b5\u03bb\u03b1\u03c4\u03ce\u03bd, \u03b1\u03be\u03b9\u03bf\u03c0\u03bf\u03b9\u03ce\u03bd\u03c4\u03b1\u03c2 \u03c0\u03ad\u03bd\u03c4\u03b5&#8230;<\/p>","protected":false},"author":1,"featured_media":14611,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[102],"tags":[158,151,159,153,155,156,152,154,119,157],"class_list":{"0":"post-14610","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-b2b","8":"tag-cybersecurity","9":"tag-m","10":"tag-odyssey","11":"tag-soc2","12":"tag-155","13":"tag-156","14":"tag-152","15":"tag-154","16":"tag-119","17":"tag-157"},"_links":{"self":[{"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/posts\/14610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/comments?post=14610"}],"version-history":[{"count":0,"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/posts\/14610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/media\/14611"}],"wp:attachment":[{"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/media?parent=14610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/categories?post=14610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mike.atsas.gr\/en\/wp-json\/wp\/v2\/tags?post=14610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}