Is Requestly safe?
Review Requestly security risks.

Nudge Security provides security profiles for thousands of SaaS apps, including Requestly. This public profile has the basics you’ll need for a vendor risk assessment. For more details on Requestly, including breach history, start a free trial of Nudge Security.
Requestly Security Profile

CATEGORY

Organization Details

What is

Requestly

?

Requestly allows you to Intercept & Modify network requests. Main features include Mocking APIs Response, Modifying headers, Setting up redirects, Switch hosts, Inserting custom scripts and much more

HEADQUARTERS

HOSTING

HOSTING LOCATION

Who's Using Requestly in your org?

Nudge Security discovers every user for every SaaS app within minutes of starting a free trial. No credit card required.

Learn how

Security Program

SECURITY CERTIFICATIONS

SOC2 Compliance
PCI Compliant
HIPAA Compliant
SOC2 Compliance
SOC 2 Compliant
GDPR Compliant
ISO 27001 Compliant
FedRamp Compliant
CSA Star Level 1
Compliant

SECURITY PAGE

SECURITY PORTAL

BUG BOUNTY

VULNERABILITY DISCLOSURE

STATUS PAGE

Requestly breach history
Has Requestly experienced a recent breach? Start a free trial of Nudge Security for a full breach history and more security program details.
Learn more

Authentication

AUTHENTICATION / SSO

Supported Okta Features
Login with Google support
Login with Microsoft support
Supports SSO
Two-factor authentication via SMS
Two-factor authentication via E-mail
Two-factor authentication via Hardware
Two-factor authentication via Software
Two-factor authentication via TOTP
Two-factor authentication via U2F

oauth details

Requestly OAuth Grants
Is Requestly connected to your other business apps? Start a free trial of Nudge Security to see all app-to-app OAuth grants.
Learn more

Supply Chain

Apps in Requestly's supply chain
  • Google Tag Manager
  • Stripe
  • Heroku
  • GitBook
  • Amazon Web Services (AWS)
  • Google Workspace
  • Office
  • Google Analytics
  • Firebase
  • Sendinblue
  • Sonatype
  • Intercom
  • Hotjar
Requestly supply chain breach history
What's in Requestly's SaaS supply chain? Start a free trial of Nudge Security to manage software supply chain security at scale.
Learn more

Subdomains

Requestly subdomains
  • track.requestly.io
  • autodiscover.requestly.io
  • secure.requestly.io
  • email.requestly.io
  • docs.requestly.io
  • api.requestly.io
  • status.requestly.io
  • amiusing.requestly.io
  • feedback.requestly.io
  • lyncdiscover.requestly.io
  • sip.requestly.io

Regain control of SaaS security.

Nudge Security discovers all SaaS accounts ever created by anyone in your org within minutes of starting a free trial. Get a full SaaS inventory today, along with insights and automation to improve your SaaS security posture.