Resources
FAQs
Subprocessors
At JSOC IT, we rely on carefully vetted third-party vendors (“subprocessors”) to deliver secure, resilient services. Each subprocessor is reviewed for security, bound by contractual obligations, and continuously monitored for compliance.

.
IT MANAGEMENT & SECURITY

Datto(Autotask, RMM, BCDR)
Service Provided : PSA, RMM, backup & recovery | Data Processed : System management, backup data | Certification : SOC 2, HIPAA

Addigy / MS Intune / Apple Business Manager
Service Provided : Device management & compliance | Data Processed : Device identifiers, compliance data | Certification : SOC 2

ThreatLocker
Service Provided : Application control & whitelisting | Data Processed : Application metadata | Certification : SOC 2

CrowdStrike
Service Provided : Endpoint detection & response | Data Processed : Endpoint telemetry | Certification : SOC 2, FedRAMP Moderate

Beyond Identity
Service Provided : Passwordless authentication | Data Processed : Identity and access data | Certification : SOC 2

Keeper Enterprise
Service Provided : Password management & secret vault | Data Processed :Encrypted credentials, vault metadata | Certification : SOC 2 , ISO 27001

IronScales
Service Provided : Phishing detection & response | Data Processed : Email metadata & phishing reports | Certification : SOC 2

Prisma Browser(Talon)
Service Provided : Secure enterprise browser | Data Processed : Session & browsing telemetry | Certification : SOC 2
