WeldDesk
Sign inStart for free

Last updated: December 2025

Security & Compliance

Security and Compliance represent key aspects of any product your team uses. WeldDesk is committed to securing access to your data, eliminating system vulnerabilities and ensuring continuity of access.

Compliance Certifications

ISO 27001

In Progress

WeldDesk is currently in the process of obtaining ISO 27001 certification. We have implemented the required information security management controls and are working with an independent auditor to complete the certification process. Contact us at security@welddesk.org for updates on our certification timeline.

SOC 2 Type II

In Progress

WeldDesk is actively working toward SOC 2 Type II certification. Our security controls are designed to meet SOC 2 requirements, and we are in the process of completing the formal audit. Contact security@welddesk.org to learn more about our progress.

GDPR & CCPA

As a Dutch company, WeldDesk is designed to comply with all requirements of the General Data Protection Regulation (GDPR). We are registered as a data processor and follow the guidelines set by the Autoriteit Persoonsgegevens (Dutch Data Protection Authority). Our platform is also designed to help you meet CCPA requirements for California residents.

Vulnerability Disclosure Policy

WeldDesk maintains a vulnerability disclosure policy to ensure security researchers can report vulnerabilities responsibly. We verify and remediate confirmed vulnerabilities rapidly and provide periodic status updates to reporters. Contact security@welddesk.org to report any security concerns.

Infrastructure & Network Security

Physical Access Control

WeldDesk infrastructure is hosted on secure cloud platforms within the European Union, with data centers that maintain strict physical access controls, 24/7 monitoring, and comprehensive security certifications.

Access Control

We implement Just-in-Time (JIT) privileged access controls. All administrative access requires business justification and is logged for audit purposes. Access is automatically revoked after the approved time period.

Penetration Testing

WeldDesk undergoes annual penetration testing conducted by independent security firms. Enterprise customers can request a summary of our penetration testing findings by contacting us.

Business Continuity & Disaster Recovery

High Availability

WeldDesk is built on redundant infrastructure with automatic failover capabilities. Our systems are designed to maintain service availability even in the event of component failures.

Data Backups

We perform daily and weekly backups stored in multiple geographic locations within the EU. All backups are encrypted at rest using AES-256 encryption.

Regional Failover

WeldDesk maintains documented disaster recovery procedures including the ability to provision services in a separate region if required. We regularly test our recovery procedures to ensure effectiveness.

Data Flow

Incoming Data

All data transmitted to WeldDesk is encrypted using HTTPS with TLS 1.2 or higher. We reject connections using weaker encryption protocols to ensure the security of data in transit.

Outgoing Data

Our web application, mobile apps (iOS and Android), and REST API all use TLS 1.2 or higher for secure communication. All integrations and webhooks are transmitted over encrypted connections.

Application Security

Authentication

WeldDesk supports multiple secure authentication methods including email-based magic links, Google Sign-In, and SAML 2.0 for enterprise customers. All authentication methods are subject to regular security assessments.

API Security

Our REST API uses secure API keys with brute-force protection and supports OAuth 2.0 for third-party integrations. API access is logged and can be monitored through your dashboard.

Multi-Factor Authentication

MFA is available for all accounts and can be enforced at the workspace level. We support authenticator apps and security keys for additional protection.

Secure Development Process

WeldDesk follows a Continuous Integration/Continuous Deployment (CI/CD) model with security integrated at every stage. All code changes undergo peer review, automated security scanning, and testing before deployment. Our development practices align with industry standards for secure software development.

Corporate Security

Endpoint Protection

All employee devices are protected with malware protection, endpoint management, and full disk encryption. We maintain an inventory of all devices with access to company systems.

Risk Management

WeldDesk conducts regular asset and scenario-based risk assessments. We test our incident response procedures quarterly and update our security policies annually.

Employee Security

All employees undergo background checks as permitted by Dutch law. Security awareness training is mandatory for all staff, with annual refresher courses and role-specific training for technical teams.

Incident Response

We maintain a documented incident response process aligned with industry best practices. Security incidents are tracked, investigated, and resolved according to defined procedures with appropriate communication to affected parties.

Questions?

If you have any questions about our security practices or would like to request compliance documentation, please contact us at security@welddesk.org.

Platform

  • AI Agent
  • Chat Widget
  • WeldAgent
  • Inbox
  • Tickets
  • Contacts
  • Team Members
  • Mobile App

Company

  • Sign Up
  • Sign In

Legal

  • Privacy Policy
  • Terms of Use
  • Compliance

Compliance

  • GDPR Compliant
  • CCPA Compliant
  • SOC 2 Type II
  • ISO 27001
© 2025 WeldDesk.All rights reserved.