Cloud 101CircleEventsBlog

STAR Registry Listing for

Tinuiti, Inc.

Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.

Tinuiti, Inc.

Tinuiti is the largest independent performance marketing firm that provides a full stack of marketing services to optimize brand performance across the Triopoly of Google, Amazon, Facebook, and beyond with over $2 billion in digital media under management and 1,100+ employees. With professional knowledge in search, social, Amazon and digital marketplaces, mobile applications, customer relationship management (CRM) and email marketing and more, Tinuiti understands that success requires both strategy and channel specialization. Each solution is delivered by leveraging Tinuiti’s performance planning framework, GAMMA (Goals and Strategy; Audiences and Targeting; Messaging and Creative; Measurement, Testing, and Learning; and Acceleration and Optimization), and enabled by a proprietary suite of marketing intelligence and media-activation technology-Mobius.

The organization is based in New York, New York, with strategic service locations in San Diego, Philadelphia, Atlanta, Los Angeles, and Fort Lauderdale.

Industries served by Tinuiti include business-to-business (B2B) services, business-to-consumer (B2C) services, education, entertainment, health and wellness, retail (apparel, beauty, crafts and hobbies, food and beverage, home and garden, sports and recreation, and toys and hobbies), technology and telecommunications, and travel and transportation.

Information about Tinuiti, Inc.
Listed Since: 02/08/2023
Last Updated: 02/08/2023

Level 1: Self-Assessment

At level one organizations can submit one or both of the security and privacy self-assessments. These are based off of the Cloud Controls Matrix and the CSA Code of Conduct for GDPR Compliance.

Security Self-Assessment
Consensus Assessments Initiative Questionnaire v4.0.2
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the CSA Cloud Controls Matrix (CCM).