By industry
By initiatives
Other | Jul 1, 2024 | 3 min read | By Harsha Chelle

Harsha Chelle leads sales, customer success, and solution engineering at Treblle, where he helps organizations make faster, more informed API decisions. With a background in computer science and experience in both engineering and go-to-market roles, he has contributed to early growth at developer-first companies like Exotel, Postman, and now Treblle. Harsha also drives enterprise positioning, growth product strategy, and technical support with a focus on delivering real outcomes for developer tools.
Thousands of companies and over 100,000 developers worldwide use Treblle today.
Ensuring the security of their data is our top priority. As we continue scaling Treblle, we want to assure all organizations using or considering working with Treblle that our commitment to security is unwavering. That's why we've achieved Service Organization Controls (SOC) 2 Type 1 certification, demonstrating our commitment to the highest security standards.
SOC 2 stands for System and Organization Controls 2. It's an internationally recognized auditing standard developed by the American Institute of Certified Public Accountants (AICPA). SOC 2 reports focus on a service organization's controls for:
These aspects are crucial for data protection.
Data security is a top concern for businesses of all sizes, across industries and geographies. For SaaS companies like Treblle that handle customer information, SOC 2 certification demonstrates a commitment to robust security practices.
Independent Validation: The SOC 2 audit verifies the effectiveness of our security controls, providing independent validation of our commitment to data protection.
Building Trust: This certification builds trust and credibility with our customers, especially those in regulated industries.
Identifying Vulnerabilities: The rigorous examination of our security controls helps us identify and address any potential vulnerabilities, further strengthening our overall security posture.
At Treblle, data security is embedded in every aspect of our operations. Here’s how we ensure your data is protected:
We have implemented a wide range of security controls to safeguard data, including:
Encryption: All data is encrypted both in transit and at rest using industry-standard protocols.
Access Control: Strict access controls ensure that only authorized personnel can access sensitive information.
Regular Audits: We conduct regular security audits and vulnerability assessments to identify and mitigate potential threats.
Our security team continuously monitors our systems for unusual activity. In the event of a security incident, we have robust incident response procedures to quickly address and resolve the issue.
24/7 Monitoring: Our systems are monitored around the clock to detect and respond to security threats in real-time.
Incident Response Plan: We have a detailed incident response plan that outlines the steps to take in case of a security breach, ensuring swift and effective resolution.
Security is a company-wide responsibility. We provide regular training to our employees to ensure they are aware of the latest security threats and best practices.
Security Training Programs: All employees undergo comprehensive security training as part of their onboarding process and receive ongoing education to stay current with the latest threats.
Phishing Simulations: We conduct regular phishing simulations to test and improve our employees' ability to recognize and respond to phishing attempts.
Achieving SOC 2 Type 1 certification is a significant milestone, but it's merely a continuation of our efforts towards security. Treblle already has the ISO 27001:2022 certificate, complies with GDPR, and is CCPA ready. Our team is dedicated to:
Our customers can have peace of mind knowing their data is secure with Treblle.
For more information about Treblle’s security, please visit our Trust Centre page.
OtherHackers breached FIA’s driver portal, exposing Max Verstappen and other F1 drivers’ data. In this article, we covered a detail breakdown, security takeaways, and how it could have been stopped.
OtherIn Sept 25, JLR suffered a major cyber attack. In this article, we provided a complete breakdown of the JLR breach, detailing what happened, how it occurred, and the lessons learned.
OtherThe newly developed Treblle Next.js SDK supports the App Router, Pages Router, and Edge runtime.