Zendesk maintains a globally-distributed Security team that monitors network security 24/7. The team uses network vulnerability scanning, intrusion detection, and prevention systems to safeguard customer data.
Additionally, Zendesk participates in Threat Intelligence Programs to stay ahead of potential security threats. These measures ensure that your data is continuously protected from unauthorized access and cyber threats.
Zendesk ensures data security by implementing robust encryption methods. Communications between customers and Zendesk servers are encrypted using HTTPS and TLS, ensuring secure access to your Zendesk subdomains. Additionally, data at rest is…
Zendesk implements stringent physical security measures to protect customer data. The company operates in data centers certified with ISO 27001, PCI/DSS Service Provider Level 1, and SOC II compliance, ensuring high standards of security. These…
Zendesk prioritizes application security by following a Secure Development Lifecycle. This includes training developers, conducting design and code reviews, and employing third-party security experts for penetration testing. These steps help…
Zendesk ensures business continuity and availability through its Disaster Recovery program. This program includes service clustering and network redundancies to eliminate single points of failure, ensuring services remain available or are easily…
Zendesk offers a range of product security features to help administrators manage access and sharing policies. These include authentication and single-sign on (SSO) options, two-factor authentication, and IP restrictions. All communications with…
Zendesk can access customer data for troubleshooting purposes only when granted permission by an account administrator. This access is known as account assumption and is deactivated by default. Administrators can activate access for a specific…