At BoldDesk, we do everything to make sure your data is always safe with us. You probably came here because you have questions, so let’s answer the important ones.
Our SOC 2 Type 2 certification verifies that BoldDesk has successfully completed a thorough audit, ensuring that our security policies and controls consistently meet the highest industry standards when it comes to keeping data safe and secret.
As a company, we take data privacy very seriously and maintain GDPR compliance with many customers in Europe.
All our platform infrastructure is hosted on Google Cloud Platform (GCP) and Microsoft Azure within virtual private clouds (VPC) we configure and manage to safeguard against unauthorized network requests. GCP and Azure are deeply committed to securing the underlying infrastructure we build on, and they are continuously expanding their compliance programs.
For more details, please refer to the Microsoft and Google data center security policies linked below:
Our application runs on the latest stable version of the Microsoft .NET Framework. We reduce the attack surface by isolating our processes with containerized microservice architecture. Our application is also automated with a real-time static analyzer tool that does extensive computation and ensures the security of our source code.
All our developers are trained to pay specific attention toward security. Our automated and manual code review processes constantly look for any code that could potentially violate security policies.
BoldDesk uses a PCI-compliant payment processor for encrypting and processing credit card payments. We have partnered with Stripe to securely handle sensitive payment processing data. Details about their security posture and PCI compliance can be found at Stripe’s Security page.
BoldDesk does not have access to customers’ credit card data at all.
All user data is transported securely, encrypted in transit and encrypted at rest. Encrypting your data provides an additional layer of protection against events such as unauthorized modification and man-in-the-middle attacks. We use 256-bit SSL/TLS 1.2 encryption and industry-standard AES-256 algorithms.
BoldDesk uses security tools to continuously scan for vulnerabilities. Additionally, vulnerabilities in third-party libraries and tools are monitored and software is patched or updated promptly when new issues are reported.
BoldDesk undergoes regular penetration testing by our in-house security experts and development team. A yearly detailed penetration test is performed by third-party security experts to confirm the security of our products and environment.
Our application and the underlying infrastructure components are actively monitored 24/7. Our engineers are immediately notified in case of an outage. You can view our historical product reliability details on the status page.
To maximize availability, our systems automatically replicate your data across multiple locations in real time. Data is also continuously backed up to ensure that we can restore access to your data and the service in the unlikely event that all data replicas fail simultaneously. Our monitoring system alerts us to any problems, and we have staff on call at all times to handle any unexpected incidents.
BoldDesk has a 99.9% uptime or higher. To check the system status at any time, go to the status page. If our systems require maintenance or a brief outage, clients will be notified in advance
To protect your customers’ data, security systems control access to your entire organization and secure your data at multiple levels. Encryption, audit logs, IP restrictions, and SSO are features that can help you protect your data and restrict access to only authorized users.
Single sign-on with BoldDesk allows users to log in and access their help desk account with a single set of credentials by using systems such as Office 365, OAuth 2.0, and OpenID.
IP restrictions allow you to limit the IP addresses from which your organization can access the help desk.
Create password policies to enforce secure, strong passwords; frequent password rotation; and password expiration to fit your security standards and policies.
Accept or reject emails received from specific senders and domains. Emails on the blocklist are blocked and are not routed to spam.