SICUREZZA E CONFORMITÀ | CERTIFICAZIONI
Ottenete l'alternativa più affidabile con il contact center su cloud.
L'insieme più completo di certificazioni e standard di sicurezza aziendale.
























Forniamo un ampio supporto per l'autenticazione e l'integrazione multifattoriale.
E Gestori delle identità (Identity Provider o IdP) conformi allo standard SAML 2.0.





Per garantire una maggiore sicurezza non bastano tecnologia e processi. Hai bisogno anche e soprattutto di persone qualificate. E noi le abbiamo.











Divulgazione delle vulnerabilità.
In Talkdesk prendiamo molto seriamente la sicurezza dei nostri clienti e ci impegniamo costantemente per migliorarla. In tal senso, il lavoro svolto dal gruppo di ricerca sulla sicurezza fornisce un contributo importante.
If you find a vulnerability that affects Talkdesk customers, send us a report with details of the vulnerability to the email address [email protected].
Il report dovrebbe includere tutti i dettagli necessari per simulare il problema, aiutandoci quindi a risolverlo tempestivamente.
Riceverai una risposta da Talkdesk a confermare il report di vulnerabilità e a fornire un identificatore che è possibile utilizzare per tenere traccia dei suoi progressi. Talkdesk manterrà sempre un canale di comunicazione aperto in modo da poter seguire i progressi.
Talkdesk confermerà la vulnerabilità e, se applicabile, definirà una sequenza temporale per l'implementazione della correzione.
Following responsible vulnerability disclosure practices, we aim to strike a balance between public awareness and “time to respond effectively” [CERT/CC]. So, we ask for security researchers to give us enough time to fix the vulnerability.
