{"id":200,"date":"2025-01-27T08:19:51","date_gmt":"2025-01-27T08:19:51","guid":{"rendered":"https:\/\/www.concentricanalytics.com\/?page_id=200"},"modified":"2025-01-27T09:52:05","modified_gmt":"2025-01-27T09:52:05","slug":"testing","status":"publish","type":"page","link":"https:\/\/www.concentricanalytics.com\/index.php\/testing\/","title":{"rendered":"testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"200\" class=\"elementor elementor-200\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b2a89f e-flex e-con-boxed e-con e-parent\" data-id=\"7b2a89f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd91d6f elementor-widget elementor-widget-heading\" data-id=\"bd91d6f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Security and SOC 2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7ad1d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0f7ad1d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAt Concentric Analytics, we prioritize the security and privacy of data. We continuously strive to enhance our security measures and maintain compliance with industry standards to provide the highest level of protection\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4722a72 e-con-full e-flex e-con e-parent\" data-id=\"4722a72\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f32b1a4 e-con-full e-flex e-con e-child\" data-id=\"f32b1a4\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7f4dde1 e-con-full e-flex e-con e-child\" data-id=\"7f4dde1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94cec9f elementor-widget elementor-widget-heading\" data-id=\"94cec9f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC 2 Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db0aae2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"db0aae2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are proud to be SOC 2 compliant, demonstrating our dedication to maintaining robust security controls. SOC 2 compliance ensures that we have implemented stringent measures to protect critical data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50f2989 e-con-full e-flex e-con e-child\" data-id=\"50f2989\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7171754 elementor-widget elementor-widget-heading\" data-id=\"7171754\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Security Measures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8385d3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b8385d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We use state-of-the-art encryption technologies to protect data both in transit and at rest. We implement strict access controls to ensure that only authorized personnel can access sensitive information. We conduct regular security audits and assessments to identify and mitigate potential vulnerabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0027856 e-con-full e-flex e-con e-child\" data-id=\"0027856\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f49712 elementor-widget elementor-widget-image\" data-id=\"0f49712\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"380\" height=\"380\" src=\"https:\/\/www.concentricanalytics.com\/wp-content\/uploads\/2025\/01\/image-3.webp\" class=\"attachment-large size-large wp-image-205\" alt=\"\" srcset=\"https:\/\/www.concentricanalytics.com\/wp-content\/uploads\/2025\/01\/image-3.webp 380w, https:\/\/www.concentricanalytics.com\/wp-content\/uploads\/2025\/01\/image-3-300x300.webp 300w, https:\/\/www.concentricanalytics.com\/wp-content\/uploads\/2025\/01\/image-3-150x150.webp 150w\" sizes=\"(max-width: 380px) 100vw, 380px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data Security and SOC 2 At Concentric Analytics, we prioritize the security and privacy of data. We continuously strive to enhance our security measures and maintain compliance with industry standards to provide the highest level of protection SOC 2 Compliance We are proud to be SOC 2 compliant, demonstrating our dedication to maintaining robust security [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-200","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/pages\/200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":13,"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/pages\/200\/revisions"}],"predecessor-version":[{"id":219,"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/pages\/200\/revisions\/219"}],"wp:attachment":[{"href":"https:\/\/www.concentricanalytics.com\/index.php\/wp-json\/wp\/v2\/media?parent=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}