F12.net

F12.net

Speciality: Ethical Hacking and Penetration Testing

Edmonton, Canada 257 employees
[01] About

F12.net is a Canadian IT services and consulting firm specializing in managed IT, cybersecurity, and cloud solutions; 189 employees, $35.6M revenue, founded 1996, with expertise in penetration testing, ethical hacking, and attack simulation to uncover vulnerabilities.

F12.net is dedicated to equipping business leaders, IT decision-makers, and their teams with the tools and strategies needed to strengthen their cyber security posture. Our IT services are tailored to enhance productivity and scalability while implementing rigorous security measures to safeguard against cyber threats. We achieve this with an emphasis on efficiency and cost-effectiveness. F12.net proudly supports organizations across British Columbia, Alberta, and Ontario, providing tailored solutions that meet the unique needs of businesses in these regions.
[02] Services
Cyber Security Services
Penetration Testing
Managed IT Services
Cloud Services
IT Consulting Services
Endpoint Protection
Identity And Access Management
Intrusion Detection And Response
Managed Detection And Response
Phishing Prevention Training
Dark Web Monitoring
Vulnerability Management
Co-managed IT Services
Device As A Service
Disaster Recovery
Infrastructure As A Service
Microsoft Cloud Services
Governance
Risk And Compliance
IT Assessment
Technology Strategy
Virtual CIO Services
[03] Certifications
SOC 2 Type 2

SOC 2 Type 2 Certification


Origin


SOC 2 (System and Organization Controls 2) was developed by the American Institute of Certified Public Accountants (AICPA) and introduced in 2011 as part of their Service Organization Control reporting framework. It was created to address the growing need for standardized security auditing as businesses increasingly moved their data and operations to third-party cloud service providers. The AICPA recognized that traditional financial auditing standards were insufficient for evaluating the security practices of technology service providers, prompting the development of SOC 2 to assess controls related to security, availability, processing integrity, confidentiality, and privacy based on their Trust Services Criteria.


Industry Importance


SOC 2 Type 2 certification is highly valued because it provides independent verification that a service provider has implemented and maintained effective security controls over a specified period (typically 6-12 months), rather than just at a single point in time like Type 1. This certification has become an essential requirement for vendors handling sensitive customer data, as it demonstrates to clients and stakeholders that robust security measures are consistently in place. Many enterprises now require SOC 2 Type 2 reports from their vendors as part of their third-party risk management programs, making it a competitive necessity for SaaS companies, cloud providers, and data processors seeking to build trust and win business with security-conscious organizations.

Canadian Controlled Goods Program (ccgp)
Cybersecure Canada Certification
ISO

ISO 27001 Cybersecurity Certification


ISO/IEC 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), first published in 2005 and revised in 2013 and 2022. It evolved from the British Standard BS 7799, which was created in the 1990s by the UK government and industry to address growing concerns about information security management. The standard was developed to provide organizations with a systematic framework for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).


ISO 27001 is highly valued in the industry because it demonstrates an organization's commitment to protecting sensitive information through internationally recognized best practices. The certification provides a competitive advantage, often serving as a requirement for doing business with government agencies and large corporations, particularly in sectors handling sensitive data. It helps organizations systematically identify security risks, implement appropriate controls, and prove due diligence in managing information security—which is increasingly important for regulatory compliance, customer trust, and reducing the likelihood of costly data breaches.

[05] Notable Clients
  • Betach Solutions Inc.
  • My Blue Umbrella (MBU)