Q37
Do you have a current SOC 2 Type II report?
Mixpanel maintains an active SOC 2 type II attestation as stated on their official security questionnaire and security overview pages.
Before you share customer data with Mixpanel, your compliance team needs documented proof they can be trusted. ThirdProof investigated Mixpanel across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
25 sources queried. 100% confidence. Every Mixpanel investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Mixpanel's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 31% complete
Q37
Mixpanel maintains an active SOC 2 type II attestation as stated on their official security questionnaire and security overview pages.
Q38
Mixpanel maintains ISO 27001 and ISO 27701 certifications as confirmed on their official security overview and security questionnaire pages.
Q41
Not found in FedRAMP marketplace
Q40
Mixpanel's official HIPAA page states 'In accordance with HIPAA, Mixpanel is prepared and able to enter into Business Associate Agreements, or BAA.'
Q42
Mixpanel provides a Data Processing Addendum (DPA) at https://mixpanel.com/legal/dpa/ to support GDPR compliance requirements.
+ 4 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Mixpanel's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Mixpanel is not listed on the FedRAMP Marketplace.
Moderate Risk
Vendor Risk Assessment
Based on data availability and source coverage
25
Sources Queried
25
Sources With Data
April 4, 2026
Last Assessed
AI-generated analysis for Mixpanel
Mixpanel, Inc. (LEI: 254900X7T87GPJF6A540) is an established product analytics vendor operating since 2007 that presents a Moderate Risk (Tier 3) profile, driven primarily by a confirmed and recent security breach that materially elevates the risk of continued data access. On the positive side, Mixpanel demonstrates several baseline security strengths:
Independence Statement
All evidence in this report was independently sourced from external data registries, threat intelligence platforms, public media archives, and certificate transparency logs without any participation or input from Mixpanel.
19 findings identified for Mixpanel
Article from www.cxtoday.com: "OpenAI Discloses Mixpanel Hack, Highlighting Risks in Third-Party Data Security"
Article from www.securityweek.com: "OpenAI User Data Exposed in Mixpanel Hack - SecurityWeek"
Article from www.purewl.com: "The Mixpanel Security Incident: What Really Happened?"
Article from securityaffairs.com: "Pornhub targeted in extortion attempt following Mixpanel breach exposing user activity"
Article from dig.watch: "Regulators question transparency after Mixpanel data leak | Digital Watch Observatory"
Article from www.ox.security: "OpenAI - Mixpanel 3rd Party Data Breach | OX Security OpenAI–Mixpanel Breach: User Data Exposed via 3rd Party"
Article from www.teiss.co.uk: "teiss - News - OpenAI notifies API customers of data exposure linked to Mixpanel breach"
Article from www.secureblink.com: "Mixpanel Breach Exposes the Dark Side of Analytics Nobody Talks About"
Article from www.rescana.com: "PornHub Premium User Data Breach: Mixpanel Hack Leads to Extortion and Privacy Risks"
Article from hackread.com: "OpenAI API User Data Exposed in Mixpanel Breach, ChatGPT Unaffected"
mixpanel.com does not have a valid SSL/TLS certificate on port 443.
18 recent article(s) reference critical security or regulatory issues for "Mixpanel": "OpenAI – Mixpanel 3rd Party Data Breach" (OX Security) https://news.google.com/rss/articles/CBMidkFVX3lxTE9wR0RXQWZCU2FXS0ZZYVdLdnpTa1czSkFZVFR4YjZrSEQ5N2RRbVRSOHBhcDNkWWpfSHRhUmtleEprbVJHQ25vVjlieHliSnZNZDJyNXRTMy0wNjdfcWVMRGJuZzhtQjBlV094VUdCaGkwcGFLTEE?oc=5; "Mixpanel breach compromises some OpenAI API users’ account data" (SiliconANGLE) https://news.google.com/rss/articles/CBMimgFBVV95cUxPV1ZyUDM2MUVNdWhkU0h3TmVBanBZVEdNb202WU5RSV9RZ0tqZTM5NGQ4QlU3QlluSTJPcjJJc2V3OF92MFc1ZkxqZmNKTWJnRy1NMkt4TTdjbjZZcnRzdUs2SVdJMldDdEFwSUgzRDl2NzJqSi1SbmtmUHprRUlQZGp6eVJxNElTOE1fYmNxaXJGQ1ZheU1YdU5n?oc=5; "OpenAI Reports Data Exposure After Mixpanel Security Incident" (FinTech Weekly) https://news.google.com/rss/articles/CBMiowFBVV95cUxOOVZvcDV4RXVTejFpcmxyallKM0ZBNDJiWnhydVRFNlFWbE9nbHVzRlRxTW5NampLWUpSQ2xleGhQMUtVb1JUX290eEMzOC1fQU5JWmJFbFpSdFdWNC12aUJTWUVLMG5aYlJXRnlISTNHSXRpRHBqempNbGZIQmhvRF94by1fUFAzVzRfZkc0SjRRTDlHbTVmU05aSFBjenQwV01N?oc=5
3 Hacker News stories about "Mixpanel" related to security incident. Top story: "Mixpanel Security Breach" (245 points).
1 article(s) reference significant concerns for "Mixpanel": "Regulators question transparency after Mixpanel data leak" (Digital Watch Observatory) https://news.google.com/rss/articles/CBMiiwFBVV95cUxPcW12M3MyQmtRZEtXSm1hZVVsOWtLbTdLNkFxNkVFSE1kOFNIMmtiLTlmNmFKX2lYZTd3TDhfaWdUbEIydlNEczE3RmZVd0Z0dFZJY3AybzJHb1NPZUxYdm1FTkNsSkl2cXpjc1BJbjlDYXhzdlBfQUhPSFJCSzF2NFNBbHdLTzN6T2x3?oc=5
MIXPANEL, INC. was first registered in the LEI system less than 1 year ago (2025-12-15T20:29:22Z).
mixpanel.com received a mediocre grade (C). Some security headers are configured but improvements are needed. Note: This scan was performed on the marketing site (mixpanel.com). The application endpoint (sso.mixpanel.com) may have different security headers. Verify the application domain separately.
mixpanel.com has certificates from 41 different Certificate Authorities. This may indicate inconsistent certificate management practices.
An AI-specific data usage policy was not discoverable for mixpanel.com through automated scanning of common policy paths and web search. The vendor may publish relevant data handling commitments in enterprise agreement documents (DPAs, product terms, licensing portals) that are not indexed at standard public URLs. Request the vendor's Data Protection Addendum or AI-specific terms directly.
mixpanel.com has no MX records, meaning it cannot receive email directly.
18 positive signals verified
Clean Website Security Scan
Website Security Scan →Legal Entity Actively Registered
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →No Adverse Media Signals
Adverse Media Scan (Fallback) →No Firmographic Data Available
Company Intelligence →No Exposed Services Found
Infrastructure Exposure →Established Domain (19+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →Large Certificate Footprint (54 subdomains)
Certificate Transparency →Established Web Presence (18+ years)
Web Archive History →Domain in 40 Threat Intelligence Pulses
Threat Intelligence (OTX) →Low Abuse Score: 0% (328 reports)
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Compliance Page Located but Content Not Extractable
Trust & Compliance Page Scan →Subprocessor Page Found (Placeholder)
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →SOC 2 Compliance Claimed on Website
Certification Registry Verification →Steps to address findings for Mixpanel
Request Mixpanel's formal post-incident report (PIR) for the November 2025 SMS phishing breach within 10 business days — ask their security team for root cause analysis, scope of exposure, remediation steps completed, and any regulatory notifications filed. This is the single highest-priority action given the breach affected high-data-access customer environments.
Request Mixpanel's current SOC 2 Type II report and bridge letter — contact their security team directly or visit trust.mixpanel.com in a browser (content may be JavaScript-rendered). Review the report for control exceptions related to access management, incident response, and data protection. Escalate if the report covers a period prior to the November 2025 breach without a subsequent bridge letter.
Manually visit trust.mixpanel.com/subprocessors in a browser to check if the subprocessor list is accessible via JavaScript rendering. If the page remains incomplete, formally request a current subprocessor list from Mixpanel's data protection officer in writing — document the request and response date in your vendor risk register.
Request Mixpanel's Data Protection Addendum (DPA) and any AI-specific product terms — specifically seek written contractual commitments on: whether customer data trains AI models, which third-party AI providers have data access, and data retention periods for AI-processed data. Complete this within 30 days.
Run an independent security header scan on Mixpanel's application domain at https://observatory.mozilla.org/analyze/sso.mixpanel.com to assess the security posture of the data-processing endpoint (separate from the marketing site that scored C). Share results with your internal security team and request a remediation plan if the score is below B.
Set a calendar reminder to re-run this vendor risk assessment in 90 days — by that point, Mixpanel should have completed post-breach remediation, potentially published an updated SOC 2 report or bridge letter, and resolved the trust page content gap. A material improvement in the evidence base could support a lower risk tier re-rating.
25 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Mixpanel? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Mixpanel on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Mixpanel's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Mixpanel a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Mixpanel appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Mixpanel's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Mixpanel's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Mixpanel claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Mixpanel depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Mixpanel appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Mixpanel and every other vendor in your stack — average report time: 7 minutes. Get Mixpanel's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Mixpanel across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.