Zendesk offers a range of product security features to help administrators manage access and sharing policies. These include authentication and single-sign on (SSO) options, two-factor authentication, and IP restrictions.
All communications with the Zendesk user interface or APIs are encrypted using industry-standard HTTPS over public networks. These features provide administrators with the tools needed to control who can access their service, ensuring secure interactions with Zendesk products.
Zendesk ensures data security by implementing robust encryption methods. Communications between customers and Zendesk servers are encrypted using HTTPS and TLS, ensuring secure access to your Zendesk subdomains. Additionally, data at rest is…
Zendesk implements stringent physical security measures to protect customer data. The company operates in data centers certified with ISO 27001, PCI/DSS Service Provider Level 1, and SOC II compliance, ensuring high standards of security. These…
Zendesk prioritizes application security by following a Secure Development Lifecycle. This includes training developers, conducting design and code reviews, and employing third-party security experts for penetration testing. These steps help…
Zendesk maintains a globally-distributed Security team that monitors network security 24/7. The team uses network vulnerability scanning, intrusion detection, and prevention systems to safeguard customer data. Additionally, Zendesk participates in…
Zendesk ensures business continuity and availability through its Disaster Recovery program. This program includes service clustering and network redundancies to eliminate single points of failure, ensuring services remain available or are easily…
Zendesk can access customer data for troubleshooting purposes only when granted permission by an account administrator. This access is known as account assumption and is deactivated by default. Administrators can activate access for a specific…