Zendesk prioritizes application security by following a Secure Development Lifecycle. This includes training developers, conducting design and code reviews, and employing third-party security experts for penetration testing.
These steps help Zendesk identify and mitigate security threats, ensuring the safety of your data across its applications. By maintaining a proactive approach to application security, Zendesk protects your business interactions from potential vulnerabilities.
Zendesk ensures data security by implementing robust encryption methods. Communications between customers and Zendesk servers are encrypted using HTTPS and TLS, ensuring secure access to your Zendesk subdomains. Additionally, data at rest is…
Zendesk implements stringent physical security measures to protect customer data. The company operates in data centers certified with ISO 27001, PCI/DSS Service Provider Level 1, and SOC II compliance, ensuring high standards of security. These…
Zendesk maintains a globally-distributed Security team that monitors network security 24/7. The team uses network vulnerability scanning, intrusion detection, and prevention systems to safeguard customer data. Additionally, Zendesk participates in…
Zendesk ensures business continuity and availability through its Disaster Recovery program. This program includes service clustering and network redundancies to eliminate single points of failure, ensuring services remain available or are easily…
Zendesk offers a range of product security features to help administrators manage access and sharing policies. These include authentication and single-sign on (SSO) options, two-factor authentication, and IP restrictions. All communications with…
Zendesk can access customer data for troubleshooting purposes only when granted permission by an account administrator. This access is known as account assumption and is deactivated by default. Administrators can activate access for a specific…