Get the trusted choice in cloud contact center.

Enterprise Class Security

Talkdesk offers the most comprehensive set of company security certifications and standards.

aicpasoc2.png?v=60.18.0
aicpasoc3.png?v=60.18.0
pci.png?v=60.18.0
iso27017.png?v=60.18.0
iso27018.png?v=60.18.0
iso27001.png?v=60.18.0
iso22301.png?v=60.18.0
iso27701.png?v=60.18.0
APEC-CBPR.png?v=60.18.0
APEC-PRP.png?v=60.18.0
gdpr.png?v=60.18.0
hipaa.png?v=60.18.0
iapp.png?v=60.18.0
mcafee.png?v=60.18.0
csastar-trusted-cloud-supervisor.png?v=60.18.0
csa.png?v=60.18.0
csastar.png?v=60.18.0
cyberessentials.png?v=60.18.0
nationalsecuritycentre.png?v=60.18.0
csp.png?v=60.18.0
trustar.png?v=60.18.0
owasp.png?v=60.18.0
nist.png?v=60.18.0
data-privacy-framework-program.png?v=60.18.0
Government Federal Fedramp Standard White Logo

Talkdesk CX Cloud™ Achieves FedRAMP® In Process Designation

Our cloud-native contact center platform is on the path to authorization, providing the highest levels of security, privacy, and compliance for your organization.

We provide broad multifactor authentication and integration support.

okta.png?v=60.18.0
google?v=60.18.0
onelogin.png?v=60.18.0
microsoft?v=60.18.0
ibm?v=60.18.0
azure9.png?v=60.18.0
auth0.png?v=60.18.0
bitium.png?v=60.18.0
centrify?v=60.18.0

And any identity provider (IDP) that complies with SAML 2.0.

To deliver better security, you need more than technology and process. You need qualified people. We’ve got them.

cissp.png?v=60.18.0
iso22301pecb.png?v=60.18.0
iso-iec-27001-provisional-implementer.png?v=60.18.0
cism.png?v=60.18.0
CDPSE.png?v=60.18.0
mor.png?v=60.18.0
ccsk.png?v=60.18.0
CEH.png?v=60.18.0
cipm.png?v=60.18.0
comptia_network?v=60.18.0
27001leadimplementer.png?v=60.18.0
oscp.png?v=60.18.0
oswe?v=60.18.0

Vulnerability disclosure.

At Talkdesk we take the security of our customers very seriously and strive to continuously improve it. In this context the work done by the security research community provides an important contribution.

If you find a vulnerability that affects Talkdesk customers, send us a report with details of the vulnerability to the email address [email protected].

The report should include all the necessary details to reproduce the issue, therefore helping us to fix it promptly.

You will receive a response from Talkdesk acknowledging the vulnerability report and providing an identifier that you can use for keeping track of its progress. Talkdesk will always keep an open communication channel to provide visibility over the progress.

Talkdesk will validate the vulnerability and, if applicable, define a timeline for deploying the fix.

Following responsible vulnerability disclosure practices, we aim to strike a balance between public awareness and “time to respond effectively” [CERT/CC]. So, we ask for security researchers to give us enough time to fix the vulnerability.

Security

Download the ebook.

To learn more, download the ebook Talkdesk Guide to Security & Compliance.