Security Policy

This page outlines the security measures and principles our team applies, so you could safely migrate your data.

Overview of Freshdesk Security

Your help desk and private data are safe with Freshdesk. There are a number of steps we take to ensure and respect your privacy.However, the measures we take to provide our clients and the visitors of our website a safe experience are not tied to just legal requirements (such as the General Data Protection Regulation, etc.) We believe we have a moral and ethical obligation to safeguard privacy.
Security Policy

Security Levels

Physical Security

Our data centers are located in Germany. Our hosting provider, Hetzner Online takes superior measures that provide physical safety of the hardware.

For instance, data center parks are protected from fire and natural disasters. Only authorized personnel can access via electronic access control terminals with a transponder key or admission card. Data parks are under 24/7 surveillance and are equipped with diesel power generators for autonomous mode.

Network Security

Freshdesk network security team protects your data against the most sophisticated electronic attacks. We use the best and proven practices of network security.

Freshdesk offers the following preventive measures:

  • network firewalls;
  • DDoS preventions;
  • network posture assessment.

Application Security Layer

  • Firewalls are in place exposing only the necessary ports through the internet and between different servers.
  • We validate all requests to ensure the security on the application level.
  • Freshdesk transmits data from the visitor's browser to our system using HTTPS.

The data in transfer is encrypted by SSL protocol and ciphers.

Data location

All data Freshdesk collects is stored electronically in Germany on the Hetzer Online data center. The data can only be accessed by an authorized staff of Freshdesk. No outside sources are allowed to connect to the database.

Security Audits

On a regular basis, we scan all systems to prevent any vulnerabilities. The software is constantly updated, so all connections to the previous version are limited, logged and checked.

We absolutely comply with your confidentiality and guarantee that all your help desk data is 100% secure before, during, and after migration procedure. We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.

Data access and authentication

Only authorized tech engineers at Freshdesk have access to the source code, can work on custom migrations and solve support cases on demand of the support staff. Different engineers have different access rights depending on their job requirements. All engineers have their own credentials as well as some parts of the software can only be reached from specific IPs.

Why does Freshdesk need specific permissions to perform the migration?

Freshdesk asks for these permissions to connect with your current and new help desk systems. After establishing the connection, we can access and transition the data. Without these permissions the help desk migration is impossible.

Certification & Compliance

EU GDPR

Freshdesk is compliant with the requirements of the General Data Protection Regulation. You can learn more information by visiting this page.

ISO/IEC 27001:2013

Freshdesk datacenters are compliant with ISO/IEC 27001:2013 since our hosting provider, Hetzner Online, has achieved this certificate.

PCI DSS

Freshdesk uses 2Checkout and PayPro to accept payments. Both providers are certified PCI Level 1 Service Providers, the most stringent level of certification available in the payments industry. You can verify this by checking 2checkout’s fraud protection policy and PayPro’s compliance page.

Note, that we do not store or process any of your payment data.

How to report a security vulnerability?

If you believe you’ve found a security vulnerability in our data migration tool, please contact us at [email protected]. Also, include the following to help investigate the case:
  • Description of the location and potential impact of the vulnerability;
  • A detailed description of the steps required to reproduce the vulnerability (POC scripts, screenshots, and screen captures are all helpful to us).

Need more details or have any questions?

If you have any questions or suggestions, please send them to [email protected].