Get Ready for the Future! Download the State of Checkout 2025 White Paper Today
Platform

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works
Solutions
Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting
Platform Pillars
Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View how Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Use Cases

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources
Solutions

Get the 2025 State of Checkout Report

View the Demo
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources
Featured resources
The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Company
Support Portal
Spreedly Support
Trust Center
Platform Status
Developer Portal
Developer Guides
Documentation
Parter Integrations
Partners & Integrations
Integrations Ecosystem
Our Partners
Latest Partner News

Webinars

Paysafe Unveils Strategic Partnership with Spreedly

Featured Partner

PayPal
Product & Solutions

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works
Solutions
Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting
Platform Pillars
Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View how Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Pricing
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources
Featured resources
The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Developers
Support Portal
Spreedly Support
Trust Center
Platform Status
Developer Portal
Developer Guides
Documentation
Company
Company
About
Careers
Contact Us
News
Company
Log In
See a Demo
Log In
See a Demo
Platform

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works
Solutions
Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting
Platform Pillars
Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View how Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Use Cases
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources
Featured resources
The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Company
Support Portal
Spreedly Support
Trust Center
Platform Status
Developer Portal
Developer Guides
Documentation
Blog
Platform

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works
Solutions
Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting
Platform Pillars
Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View how Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo
Use Cases
Resources

The Open Payments Library

Take a look at all of our resources and get the information you need to grow your business

View all Resources
Featured resources
The Payments Guide to Expansion into LATAM
Accelerate Your Growth by Expanding into Brazil
Security, Compliance, and AI: Inside Spreedly’s 2025 Foundation:

Spreedly Makes Agentic Commerce a Live Channel for Merchants

Read More
Company
Support Portal
Spreedly Support
Trust Center
Platform Status
Developer Portal
Developer Guides
Documentation
Blog
Log In
See Demo

Product & Solutions

Learn more about the only open payments platform built for global commerce

How it Works
Solutions
Open Payments Connectivity
Payment Data Security & Compliance
Intelligent Payment Optimization
Fraud Prevention & Authentication
Operational Agility & Simplicity
Centralized Management & Reporting
Platform Pillars
Connect

The unified orchestration layer for wallets and alternative payments

Vault

The secure repository for all your payment methods

Optimize

Workflow-driven payments intelligence for smarter routing and higher auth rates

Protect

A flexible fraud and authentication layer. Instantly add advanced fraud tools and 3DS

Resolve

Reduce siloes, advanced security and billing control

View how Spreedly

Connects to your favorite payment methods
Optimizes your revenue
Protects your data
Reduces fraud
View the Demo

Trust Center

Nothing’s more important than your peace of mind and confidence when processing a transaction through the Spreedly platform.

Want to learn more about Spreedly’s security capabilities?

Spreedly is part of the Cloud Security Alliance (CSA) STAR Program

Learn more about Spreedly's level 1 self-assessment

View Spreedly's CAIQ

Spreedly’s Whistic Security Profile provides key details about our security and compliance program, including our SOC 2 Type 2 report and summaries of executive penetration tests.

Sign our NDA and then be provided access to review our Security Profile in Whistic.

See Our Whistic Security Profile

Spreedly also maintains an "A" for our Security Scorecard score click below for the details.

See how Spreedly maintains an “A”

See Our Security Scorecard

Compliance

GDPR

Ensuring world-class data privacy and individual rights for all our users globally.

Data Privacy Framework

Certified for secure and legal data transfers between the EU, UK, Switzerland, and the US.

Visa Global Registry of Service Providers

Publicly recognized by Visa as a Level 1 Service Provider for PCI DSS, meeting the highest global standards for payment security.

CSA Star Level I

Committed to transparency and rigorous security standards for our cloud infrastructure.

AICPA SOC

SOC 2 Type II certification is an independently audited and verified for consistent, long-term security and operational excellence.

PCI APO

Official PCI SSC Associate Participating Organization and industry contributor.

Resources

PCI Compliant

Our compliance program focuses on the identification and implementation  of relevant legislative statutory, regulatory, and contractual controls to ensure ongoing compliance for Spreedly and its customers. Spreedly is Level 1 PCI Compliant.

View Our Attestation Of Compliance

SOC 2 Type 2

Spreedly has passed its SOC 2 Type 2 audit with no exceptions. System and Organization Controls (SOC) is a suite of service offerings Certified Public Accountants (CPAs) provide in connection with system-level controls of a service organization or entity-level controls of other organizations.

Request our SOC2 Report

Status Page

Customer impacting incidents along with post-mortems are posted on our StatusPage. Customers can subscribe to receive real-time incident notifications via this same link

View Our Status Page

Privacy Program

Our privacy program includes but is not limited to a comprehensive data classification and handling policy along with directive and technical controls for data retention, sanitization, loss/leakage prevention, masking, and encryption at rest and in transit.

View Spreedly’s Privacy Policy

Shared Responsibility Matrix

This Spreedly Services Shared Responsibility Matrix defines the security, compliance, and operational responsibilities between Spreedly and its customers. This matrix is intended to provide transparency and to ensure both parties understand their respective obligations.

View Spreedly’s Shared Responsibility Matrix

FAQ

Compliance
Security
Corporate Security
Privacy
Reliability
How Secure is Spreedly's Hosting?

Spreedly operates in a cloud based environment via AWS with multiple mechanisms in place to ensure resiliency and business continuity. For more information please reference the AWS datacenter PCI L1 compliance page, which certifies extensive physical protections as well, and houses various other banking, government, and security agencies.

Does Spreedly Offer Monitoring, Logging, & Alerting?

Several observability tools are leveraged to monitor the four golden signals of latency, traffic, errors, and saturation utilizing synthetic transactions and other technical measures to address issues before they cause customer impact. Comprehensive logging is in place for key activities along with automated alerting that initiates Spreedly’s incident response process.

What Are Spreedly’s Incident Response Procedures?

Spreedly maintains an Incident Response (IR) policy and procedures for detecting, monitoring and responding to actual or reasonably suspected intrusions and security incidents, and reporting actual or reasonably suspected security or privacy incidents. Incident Commanders and Incident Response Teams receive annual training and participate in regular IR exercises.Problem management processes are in place to ensure post-incident review of events along with a root cause analysis is conducted with actions taken to prevent recurrence.

Does Spreedly Have Business Continuity and Disaster Recovery Plans?

Spreedly reviews its business continuity plan at least annually and conducts regular tabletop exercises to address business continuity of key people, processes, and third parties. An annual disaster recovery exercise for critical technology resiliency is in place to confirm we can meet our Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Spreedly’s card data environment (CDE) is architected in a resilient manner via multiple availability zones in multiple AWS regions.

How can I submit a potential security incident or vulnerability?

Robust Information Security is a paramount capability and business requirement for our company.While we don’t offer a bug-bounty or similar rewards program for submitting unsolicited information security vulnerabilities or potential incidents, we remain grateful for your efforts in helping “raise the [security] tide of all boats” operating on the World Wide Web.If you’re willing to submit your finding within these constraints, submission details can be found here.

Is Spreedly’s Hosting Secure?

Spreedly operates in a cloud based environment via AWS with multiple mechanisms in place to ensure resiliency and business continuity. For more information please reference the AWS datacenter PCI L1 compliance page, which certifies extensive physical protections as well, and houses various other banking, government, and security agencies.

How Does Spreedly Protect Your Data?

Spreedly requires TLS v1.2 for its Core transactional API when supported by the connecting client. Beyond that single requirement, Spreedly’s secure configuration currently warrants an A+ rating from SSL Labs, meaning that Spreedly’s website security is resilient to attacks exploiting older weaker TLS versions.Spreedly uses the Advanced Encryption Standard (AES) with 256-bit keys when encrypting confidential data within the vault.  Each confidential record within the vault is encrypted using a separate, randomly generated, encryption key.  This key itself is then further protected by encrypting with an asymmetric key (RSA, 2048 bits).More details about Spreedly’s privacy program can be found here.

Does Spreedly Have Vulnerability Management and Penetration Testing?

Spreedly leverages several reputable outside sources for threat intelligence. Ongoing, internal and external independent, recurring third party vulnerability scanning and multiple yearly penetration tests are the proactive measures we use to identify security vulnerabilities within our environment. Both static and dynamic application security testing is in place. This helps Spreedly identify different types of vulnerabilities in an application at different stages of development, providing a more comprehensive security analysis and ensuring maximum protection against potential threats. We also take a methodical risk based approach when managing vulnerabilities that align to Spreedly’s risk appetite and tolerance. Remediation timelines are based on industry standards and account for the agility needed to address zero day vulnerabilities.

Spreedly also performs social engineering tests such as phishing campaigns on a regular basis in addition to table top exercises that seek to assess and improve our incident response to common likely and impactful threats such as ransomware

What Is Spreedly ID?

Protecting data and customers with a suite of layered security tools that work in concert to keep all Spreedly customers’ safe. This comprehensive set of security functionality allows customers to limit security breaches, protect PCI data, and avoid malicious network access.

‍Encryption in Transit
When connecting to Spreedly ID, all data is encrypted in transit using only supported TLS protocols.

‍Password Best Practices
‍Longer passwords are harder to guess/crack. Spreedly recommends creating passwords using passphrases. Passphrases are made up of longer sentences and/or words that are meaningful to a user (and not others) that allows one to more easily remember a password without writing it down. Session timeouts due to inactivity and forced log outs are also in place.

‍Multi-Factor Authentication (MFA)
‍MFA is a required protection for all Spreedly ID access. MFA enhances security by requiring another factor of login verification to Spreedly administration tools versus just a single username and password. A necessity to strengthen defenses – Multi-Factor Authentication (MFA) goes a long way in protecting sensitive PCI data and network access. While it’s never possible to stop all data breaches and attacks, MFA can help merchants reduce the likelihood of a cyberattack.

‍Role-Based Access Control (RBAC)
Compartmentalize access to sensitive areas of your Spreedly administrative tools: Security keys, reporting, and more by leveraging RBAC. Spreedly offers several pre-configured roles to ensure the appropriate administration and needed separation for specific functions.Organizations can manage their own users’ access to sensitive company information by selecting the appropriate role(s) of key customer stakeholders. These user access controls result in a more secure method for employees to access the unique information they need to do their jobs and prevents them from accessing information that doesn't pertain to them.

Does Spreedly Provide Security Advisories?

Spreedly will provide security notifications here related to potential threats to Spreedly information systems, our response, current status, and risk posture.

Does Spreedly Have Ongoing Security Evaluations?

These terms mean different things to different organizations but they each share in representing a continuum of constantly assessing and improving information security — from known patchable vulnerabilities, syntactical coding exploits, and semantic process deficiencies. Spreedly performs all three of these assessment types (including social engineering tests such as phishing tests) on a regular basis in addition to process-only table top exercises that seek to assess and improve our incident response to common likely and impactful threats such as ransomware.

Does Spreedly Take A Layered Approach to Security?

From an architectural perspective, Spreedly seeks to embrace zero trust security ideals where access to resources are fully authenticated, fully authorized, and fully encrypted based upon user credentials (with Multi-Factor Authentication) from inventoried and managed devices. And we measure our resilient information security posture against the Secure Controls Framework (SCF), bettering our ability to prevent, detect, and respond to information security attacks. We also maintain an "A" for our Security Scorecard score click below for the details.

What Are Spreedly’s Privacy Controls?

Spreedly leverages layers of controls to ensure the privacy and protection of customer data. Our privacy program includes but is not limited to a comprehensive data classification and handling policy along with directive and technical controls for data retention, sanitization, loss/leakage prevention, masking, and encryption at rest and in transit.

Is Spreedly GDPR Compliant?

Spreedly is General Data Protection Regulation (GDPR) compliant, and maintains GDPR compliance for all the processors and sub processors in our technology stack where we decide on your behalf how data will be processed. More information about our GDPR compliance can be found here.

Is Spreedly Certified Under the Data Privacy Framework (DPF)?

Spreedly complies with EU-U.S. Data Privacy Framework, the UK Extension to the EU-U.S. DPF, and the Swiss-U.S. Data Privacy Framework. Learn more about the Data Privacy Framework (DPF) program, and view our certification. Spreedly also utilizes Standard Contractual Clauses with EU Data Controllers to ensure compliance with EU law regarding data protection.

What’s Spreedly’s Privacy Policy?

View our Privacy Policy.
‍
If you need to modify the Privacy Controls for this site click "Privacy Settings" located at the bottom of every page.

How Secure Is Spreedly’s Hosting?

Spreedly operates in a cloud based environment via AWS with multiple mechanisms in place to ensure resiliency and business continuity. For more information please reference the AWS datacenter PCI L1 compliance page, which certifies extensive physical protections as well, and houses various other banking, government, and security agencies.

Does Spreedly Offer Monitoring, Logging, & Alerting?

Several observability tools are leveraged to monitor the four golden signals of latency, traffic, errors, and saturation utilizing synthetic transactions and other technical measures to address issues before they cause customer impact. Comprehensive logging is in place for key activities along with automated alerting that initiates Spreedly’s incident response process.

What Are Spreedly’s Incident Response Procedures?

Spreedly maintains an Incident Response (IR) policy and procedures for detecting, monitoring and responding to actual or reasonably suspected intrusions and security incidents, and reporting actual or reasonably suspected security or privacy incidents. Incident Commanders and Incident Response Teams receive annual training and participate in regular IR exercises. Problem management processes are in place to ensure post-incident review of events along with a root cause analysis is conducted with actions taken to prevent recurrence.

Does Spreedly Have Business Continuity and Disaster Recovery Plans?

Spreedly reviews its business continuity plan at least annually and conducts regular tabletop exercises to address business continuity of key people, processes, and third parties. An annual disaster recovery exercise for critical technology resiliency is in place to confirm we can meet our Recovery Time Objective (RTO) and Recovery Point Objective (RPO).

Spreedly’s card data environment (CDE) is architected in a resilient manner via multiple availability zones in multiple AWS regions.

Does Spreedly Have A Status Page?

Customer impacting incidents along with post-mortems are posted on our Status Page. Customers can subscribe to receive real-time incident notifications via this same link.We pride ourselves in providing at least 99.9% uptime for services related to Payment Orchestration.

How can I submit a potential security incident or vulnerability?

Robust Information Security is a paramount capability and business requirement for our company.While we don’t offer a bug-bounty or similar rewards program for submitting unsolicited information security vulnerabilities or potential incidents, we remain grateful for your efforts in helping “raise the [security] tide of all boats” operating on the World Wide Web.If you’re willing to submit your finding within these constraints, submission details can be found here.

Resources for Further Information

Spreedly Support

Reach out to payments security experts to get specific answers to security and compliance questions.

Contact Support

Knowledge Base

Find more information about common security and company questions written by Spreedly experts.

Access Our Knowledge Base

Tell Us How We Can Help

Ready to take your payments strategy to the next level? Reach out and we’ll show you how we can make it happen!

Insights and updates you actually care about

By subscribing, you agree to our Privacy Policy and Terms.

Find Us On

Company
  • Pricing
  • About
  • Careers
  • Contact Us
  • Partners
Resources
  • Support
  • Guides
  • FAQ
  • News
  • Webinars
  • Trust Center
Developers
  • Developer Guides
  • Documentation
  • See Demo
  • Status

Find Us On

Privacy SettingsTermsPrivacyStatus
© 2025 Spreedly, Inc. All rights reserved.