Global security and user access
- Global security and sign-in resources
- Monitoring agent activity with the Access Log API
- Getting Started with Advanced Encryption (EAP)
- Designating an email address to receive required security notifications
- Zendesk Suite Product Controls and Recommendations Guide
- Zendesk Suite Actionable Security Guide
- Understanding options for end-user access and sign-in
- Managing two-factor authentication (2FA)
- Giving users different ways to sign into Zendesk
- Accessing Zendesk with a reverse proxy
- Understanding account owner permissions
- Zendesk's secure-by-design cloud solution
- Managing security settings in Admin Center
- General security best practices
- Securing sensitive information
- Security for third party integrations
- Additional security for Support
- Enhanced Disaster Recovery
- Advanced Compliance
- Zendesk's Commitment to International Standards for Information Security and Privacy (ISO 27001, ISO 27018 and ISO 27701)
- Changing the account owner
- Granting Zendesk temporary access to assume your account
- Setting the password security level
- Restricting access to Zendesk Support and your Help Center using IP restrictions
- Understanding your Zendesk session time
- Configuring your firewall for use with Zendesk
- Managing malicious attachments
- Choosing the best authentication option for my account
- Global security and sign-in resources
- Monitoring agent activity with the Access Log API
- Getting Started with Advanced Encryption (EAP)
- Designating an email address to receive required security notifications
- Zendesk Suite Product Controls and Recommendations Guide
- Zendesk Suite Actionable Security Guide
- Understanding options for end-user access and sign-in
- Managing two-factor authentication (2FA)
- Giving users different ways to sign into Zendesk
- Accessing Zendesk with a reverse proxy
- Understanding account owner permissions
- Zendesk's secure-by-design cloud solution
- Managing security settings in Admin Center
- General security best practices
- Securing sensitive information
- Security for third party integrations
- Additional security for Support
- Enhanced Disaster Recovery
- Advanced Compliance
- Zendesk's Commitment to International Standards for Information Security and Privacy (ISO 27001, ISO 27018 and ISO 27701)
- Changing the account owner
- Granting Zendesk temporary access to assume your account
- Setting the password security level
- Restricting access to Zendesk Support and your Help Center using IP restrictions
- Understanding your Zendesk session time
- Configuring your firewall for use with Zendesk
- Managing malicious attachments
- Choosing the best authentication option for my account