Announcing Requestly SOC 2 Type II Certification

Your lightweight Client for API debugging
No Login Required
Requestly isnât available for download on mobile or tablets.
To download it, please open this page on a desktop PC and enter your email to get the link.
- Local Projects
- Organize API into Collections & Environments
- API Tests
- Import from Postman, OpenAPI, etc
- Redirect URLs & modify HTTP headers
- Mock API / GraphQL responses
- Insert custom JavaScript scripts
We’re excited to announce that Requestly has completed the SOC 2 Type 2 certification. This milestone reflects our ongoing commitment to maintaining the highest standards of security, availability, and confidentiality for our customers.
What is SOC 2 Type 2 Compliance?
SOC 2 (Service Organization Control 2) is a widely recognized auditing standard developed by the American Institute of Certified Public Accountants (AICPA). While SOC 2 Type 1 assesses a company’s systems at a single point in time, Type 2 goes further by evaluating the effectiveness of those systems over an extended period – typically six months to a year.
Why This Matters for Our Customers?

Achieving SOC 2 Type 2 compliance means that Requestly has demonstrated:
- Robust security practices: We have comprehensive controls to protect customer data from unauthorized access and security threats.
- Consistent performance: Our systems and processes maintain high availability and performance.
- Data integrity: We handle and process data reliably and as intended.
- Confidentiality: We have strong safeguards to protect sensitive information.
- Privacy protection: We adhere to our privacy policies and GDPR compliance.
For our customers, especially those in regulated industries or dealing with sensitive data, this certification assures that Requestly meets rigorous, industry-standard criteria for managing and protecting data.
Our Journey to Compliance
Obtaining SOC 2 Type 2 certification was no small feat. It required a company-wide effort and dedication to excellence. Over the past year, we:
- Underwent a comprehensive risk assessment
- Strengthened our security policies and procedures
- Enhanced our monitoring and alerting systems
- Conducted regular security awareness training for all employees
- Worked closely with independent auditors to verify our practices
Looking Ahead
While we’re proud of this achievement, we view SOC 2 compliance as an ongoing process, not a one-time event. We’re committed to continually improving our security posture and adapting to evolving threats and best practices.
What This Means for You
As a Requestly customer, you can continue to use our platform with even greater confidence, knowing that your data is protected by industry-leading security practices. If you need our SOC 2 Type 2 report for your compliance requirements, please don’t hesitate to contact our support team at [email protected]
We thank you for your trust in Requestly. We remain dedicated to providing a secure, reliable platform to support your needs.
Contents
Subscribe for latest updates
Share this article
Related posts
Get started today
Requestly isnât available for download on mobile or tablets.
To download it, please open this page on a desktop PC and enter your email to get the link.
- Local Projects
- Organize API into Collections & Environments
- API Tests
- Import from Postman, OpenAPI, etc
- Redirect URLs & modify HTTP headers
- Mock API / GraphQL responses
- Insert custom JavaScript scripts









