Tangibly Achieves SOC 2 Compliance, Reinforcing Our Commitment to Security and Trade Secret Protection

営業秘密保護法(DTSA)に基づく内部告発者免責の理解
Last Updated: 3月 10, 2026
Updated by: Tangibly

Table Of Content

We are proud to share that Tangibly has successfully completed its SOC 2 audit again this year, marking an important milestone in our continued commitment to enterprise grade security, operational integrity, and customer trust.

SOC 2 compliance validates that the systems and controls behind our platform meet rigorous standards for safeguarding data and maintaining secure operations. For the companies, legal teams, and innovation leaders who rely on Tangibly to help protect valuable know how, this achievement is an important signal that security remains central to everything we do.

As Tangibly continues to support leading companies and innovation teams around the world, this milestone reflects our ongoing investment in building a platform customers can trust with some of their most sensitive and strategically important information.

“We are proud to announce that Tangibly has achieved SOC 2 compliance again this year,” said Liat Belinson, co founder and CTO of Tangibly. “Security and trust are fundamental to our platform. This milestone reflects our commitment to protecting our customers’ data and supporting organizations that rely on Tangibly to apply best practices in managing their know how and trade secrets. It is also a testament to the hard work and dedication of our entire team.”

This milestone is especially meaningful because security and trade secret protection are deeply connected. Best practices are essential when it comes to protecting know how. Companies cannot claim to value their trade secrets without also putting the right systems, controls, and processes in place to protect them.

At Tangibly, we live this responsibility in two ways. First, we hold ourselves to a high standard when it comes to protecting our own confidential information and internal innovations. Second, we help companies apply best practices to identify, manage, and protect their trade secrets more effectively. Achieving SOC 2 compliance reflects both sides of that mission.

For us, this is about more than meeting a standard. It is about leading by example. If we expect organizations to take the protection of their know how seriously, we must do the same in every aspect of our own operations.

We see SOC 2 compliance as part of a larger commitment to helping organizations build stronger foundations for protecting what makes them valuable. In a world where innovation moves quickly and sensitive information is constantly at risk, disciplined security practices are not optional. They are essential.

Thank you to our team and partners who helped make this possible. Meet with our team of experts if you’d like to learn more. 

from our blog

Blog, AI & IP, Case Law & Industry Trends, Featured Blogs, Guest Author Series

Using AI doesn’t make your law firm AI-native

Recent buzzwords are “AI-native” and especially the “AI-native law firm”, but what do they mean and why are they a big deal in the legal industry? First, let’s exclude...
Blog, Featured Blogs, Guest Author Series, Trade Secret Strategy

Top-10 surprising “business” trade secrets

If the scope of patents is large, the range of trade secrets is enormous! In my mind, the world of trade secrets can be divided into two large buckets: “technical” and...
Blog, Featured Blogs, Guest Author Series, Trade Secret Strategy

The three necessary ingredients to a trade secret

If you read cases and statutes about trade secrets from anywhere in the world, you will see a three-part definition is used.  Trade secret law is remarkably harmonized,...
Blog, Case Law & Industry Trends, Trade Secret Strategy

HouseCanary Wins Big, Loses Bigger, and Still Walks Away With a Massive Trade Secret Verdict

This Texas trade secret verdict is a good reminder that even when a plaintiff wins big, trade secret litigation can still turn on procedural issues at the very end....
Blog, Case Law & Industry Trends, Trade Secret Strategy

What’s happening in the Epic Games trade secret lawsuit over Fortnite leaks?

Another Epic lawsuit! This case is another great, Epic even, example of how 70% of trade secret problems come from insider leaks like employee or contractor misconduct....
Blog, AI & IP, Intellectual Property & Patent Insights, Trade Secret Strategy

What is litigation funding?

With the recent press release from SIM IP and Tangibly, a client recently asked me a simple but important question: how does litigation funding actually work? The...
Blog, Featured Blogs, Guest Author Series, Press, Trade Secret Strategy

SIM IP and Tangibly Launch Trade Secret Litigation Financing Partnership

Miami – Jan 15, 2026 – Sauvegarder Investment Management, Inc. (“SIM IP”), a global leader in intellectual property-based investment and monetization, and Tangibly, an...
Blog, Trade Secret Strategy

How do litigation funding companies evaluate trade secret claims?

Trade secret misappropriation cases can produce substantial recoveries, but they are complex, expensive, and inherently risky. For companies confronting stolen trade...
Blog, Trade Secret Strategy

The financial impact of trade secret misappropriation

Trade secret misappropriation is not merely a legal dispute. It is a direct assault on enterprise value. When confidential business information is taken, misused, or...
Blog, Trade Secret Strategy

What to do after discovering trade secret misappropriation or IP theft

Discovering that trade secrets or other confidential information have been stolen, whether by an employee, competitor, or third party, poses a serious threat to your...