Skip to main content

ThousandEyes Successfully Completes SOC 2 Type 2 Audit

ThousandEyes announced completion of the Service Organization Controls (SOC) 2 Type 2 audit highlighting the company's commitment to customer data security.

ThousandEyes' privacy practices regarding collection and use of personal information on the company's websites and apps were also re-certified for compliance with international privacy regulations by TRUSTe, the leading global Data Privacy Management company, through TRUSTe's Privacy Certification programs.

"Many of our customers are multinational Fortune 500 and Global 2000 companies with offices around the world. They need technology partners with robust information security and privacy management systems to minimize risks and retain compliance with laws, regulations and internal policies. This attestation is validation of our platform and our security management system," said Alexander Anoufriev, chief information security officer at ThousandEyes. "Our emphasis on security is one of the reasons that four of the top six U.S. banks and 24 of the Fortune 500 use ThousandEyes for network intelligence."

Completion of attest engagement using AT Section 101 standard and availability of the SOC 2 Type 2 report is the result of a continuous audit conducted to ensure the proper operation of security controls, which amounted to more than 150 tests over a six-month period. ThousandEyes demonstrated excellence among software as a service (SaaS) providers with a report that contained no exceptions or notes, showing remarkable data security controls and operations. The report and testing, conducted by the independent firm Schellman (formerly BrightLine CPAs & Associates), supersedes the SOC 2 Type 1 report that ThousandEyes received in September 2015, which tested the suitability of the company's design of security controls whereas SOC 2 Type 2 also verifies operating effectiveness.

In the report, Regulatory Compliance Alone Cannot Mitigate Cloud Vendor Risks, published by Gartner, written by Gayla Sullivan, Jay Heiser and Rob McMillan on February 9, 2016, it recommends that customers should regularly "obtain annual audit reports, such as the vendor's SOC 2 report, and confirmation of critical certifications, for example, ISO 27001: Information Security Management." The report adds, "Attach these certificates and attestations to the cloud vendor's risk profile each year as they are received."

Since being founded, protecting the security and privacy of customer data has been a top priority for ThousandEyes. The company has built a solid management foundation through adoption of the widely recognized and respected ISO/IEC 27001 standard for their information security management system. The ThousandEyes privacy management system is based on the Safe Harbor Framework.

The Latest

According to Gartner, Inc. the following six trends will shape the future of cloud over the next four years, ultimately resulting in new ways of working that are digital in nature and transformative in impact ...

2020 was the equivalent of a wedding with a top-shelf open bar. As businesses scrambled to adjust to remote work, digital transformation accelerated at breakneck speed. New software categories emerged overnight. Tech stacks ballooned with all sorts of SaaS apps solving ALL the problems — often with little oversight or long-term integration planning, and yes frequently a lot of duplicated functionality ... But now the music's faded. The lights are on. Everyone from the CIO to the CFO is checking the bill. Welcome to the Great SaaS Hangover ...

Regardless of OpenShift being a scalable and flexible software, it can be a pain to monitor since complete visibility into the underlying operations is not guaranteed ... To effectively monitor an OpenShift environment, IT administrators should focus on these five key elements and their associated metrics ...

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

ThousandEyes Successfully Completes SOC 2 Type 2 Audit

ThousandEyes announced completion of the Service Organization Controls (SOC) 2 Type 2 audit highlighting the company's commitment to customer data security.

ThousandEyes' privacy practices regarding collection and use of personal information on the company's websites and apps were also re-certified for compliance with international privacy regulations by TRUSTe, the leading global Data Privacy Management company, through TRUSTe's Privacy Certification programs.

"Many of our customers are multinational Fortune 500 and Global 2000 companies with offices around the world. They need technology partners with robust information security and privacy management systems to minimize risks and retain compliance with laws, regulations and internal policies. This attestation is validation of our platform and our security management system," said Alexander Anoufriev, chief information security officer at ThousandEyes. "Our emphasis on security is one of the reasons that four of the top six U.S. banks and 24 of the Fortune 500 use ThousandEyes for network intelligence."

Completion of attest engagement using AT Section 101 standard and availability of the SOC 2 Type 2 report is the result of a continuous audit conducted to ensure the proper operation of security controls, which amounted to more than 150 tests over a six-month period. ThousandEyes demonstrated excellence among software as a service (SaaS) providers with a report that contained no exceptions or notes, showing remarkable data security controls and operations. The report and testing, conducted by the independent firm Schellman (formerly BrightLine CPAs & Associates), supersedes the SOC 2 Type 1 report that ThousandEyes received in September 2015, which tested the suitability of the company's design of security controls whereas SOC 2 Type 2 also verifies operating effectiveness.

In the report, Regulatory Compliance Alone Cannot Mitigate Cloud Vendor Risks, published by Gartner, written by Gayla Sullivan, Jay Heiser and Rob McMillan on February 9, 2016, it recommends that customers should regularly "obtain annual audit reports, such as the vendor's SOC 2 report, and confirmation of critical certifications, for example, ISO 27001: Information Security Management." The report adds, "Attach these certificates and attestations to the cloud vendor's risk profile each year as they are received."

Since being founded, protecting the security and privacy of customer data has been a top priority for ThousandEyes. The company has built a solid management foundation through adoption of the widely recognized and respected ISO/IEC 27001 standard for their information security management system. The ThousandEyes privacy management system is based on the Safe Harbor Framework.

The Latest

According to Gartner, Inc. the following six trends will shape the future of cloud over the next four years, ultimately resulting in new ways of working that are digital in nature and transformative in impact ...

2020 was the equivalent of a wedding with a top-shelf open bar. As businesses scrambled to adjust to remote work, digital transformation accelerated at breakneck speed. New software categories emerged overnight. Tech stacks ballooned with all sorts of SaaS apps solving ALL the problems — often with little oversight or long-term integration planning, and yes frequently a lot of duplicated functionality ... But now the music's faded. The lights are on. Everyone from the CIO to the CFO is checking the bill. Welcome to the Great SaaS Hangover ...

Regardless of OpenShift being a scalable and flexible software, it can be a pain to monitor since complete visibility into the underlying operations is not guaranteed ... To effectively monitor an OpenShift environment, IT administrators should focus on these five key elements and their associated metrics ...

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...