Visible: Shifting SOC 2 from resource obstacle to marketing asset

Visible reduced its sales cycle time by 30% using Strike Graph’s compliance and certification platform.


Chicago, IL

Investor relationship management software
Security compliance Boosting revenue SOC 2

Trusted by over 4300 companies, Visible is an investor relationship management platform that makes it easy for companies to track KPIs, raise funds, and keep investors up to date. Investors can track their investments, visualize data for presenting, and access key information for analysis. 

The challenge 

As Visible began to grow and work with larger investors and venture firms, the company’s leadership knew it would face more intense scrutiny around security. “[We] just wanted a way for us to be able to give our customers confidence that we are taking the security and privacy of their data to the highest standard,” says founder and CEO Mike Preuss. 

Preuss believed becoming SOC 2 compliant would not only save the Visible team time, but it would streamline the security process and allow them to close deals faster — but the compliance process was totally new to them. This meant that they were looking for a solution that would let them be successful without any pre-existing security compliance expertise.

The Strike Graph partnership

Preuss learned about Strike Graph’s compliance and certification platform through a trusted referral. And, the blend of technology, flexibility, and educational resources and additional support Strike Graph offers aligned precisely with Visible’s needs.

When Visible began the SOC 2 process with Strike Graph, the team was completely new to SOC 2. “Strike Graph helped me and our CTO to really understand the fundamentals of SOC 2 compliance,” says Preuss, “and how we could become SOC 2 compliant as quickly as possible.” 

He says four of Strike Graph features in particular made the SOC 2 process easier for Visible:

  1. Collaborative tools — Strike Graph supports collaboration within a single team and cross-team synergy throughout an organization. Additionally, responsibility for controls and evidence can be assigned to specific team members, easing the burden on leadership.
  2. Automated reminders — Notifications for evidence expiration and other ongoing security maintenance means there’s never a last minute crunch or missed deadline.
  3. Trust asset library — The ability to upload, organize, and easily share trust assets like certifications and security questionnaires empowers companies to close deals faster and maintain customer loyalty.
  4. Educational resources — From quick tips within the platform to an extensive educational library, Strike Graph turns anyone into an instant security expert. And, our experienced customer success team is ready if additional guidance is needed.

The outcome

Preuss says that working with Strike Graph allowed Visible to shift SOC 2 compliance from something the company was obliged to do into a valuable marketing asset. “It's instrumental in our sales motion because now we're able to generate a beautiful security document we can send out as part of our marketing materials.”

Being able to send the SOC 2 report and security questionnaire answers directly from the Strike Graph platform has also made closing deals easier and faster. Visible has seen a 30% decrease in their sales cycle length since achieving SOC 2 compliance.

“People trust Visible because of the SOC 2 compliance that we've gone through with Strike Graph,” says Preuss.

 What’s next?

Visible is keeping an eye on the ever-changing IT security and privacy landscape. If further certifications become advantageous for their business, they’ll be able to achieve them quickly leveraging their existing work in Strike Graph’s platform.

  • copy-link-icon

    Copy URL

  • facebook-icon
  • linkedin-icon

Strike Graph’s pre-audit security packet not only streamlined and simplified our SOC 2 compliance efforts, but it even helped us earn the confidence of a valued customer.


Chief AI Officer, Foundation AI

Are you ready to build trust through cybersecurity?