Skip to main content

Is zendesk.nl a Scam? Security Check Results - Zendesk Reviews

zendesk.nl favicon

Is zendesk.nl Safe? Security Analysis for Zendesk

Check if zendesk.nl is a scam or legitimate. Free security scan and reviews.

TechnologyNetherlandsenterprise
React (Next.js)Google Tag ManagerMarketoOneTrustAdobe Web SDK+2 more
Analyzed 9/5/2025Completed 2:49:44 AM
68
Security Score
MEDIUM RISK

AI Summary

Zendesk is a leading global provider of AI-driven customer service software solutions, trusted by over 200,000 customers. The company offers a comprehensive suite of products including AI agents, ticketing systems, messaging, live chat, voice, and workforce management, targeting businesses of all sizes from startups to large enterprises. The website is professionally designed, multilingual, and optimized for performance and accessibility, reflecting a mature digital presence. Technically, Zendesk employs modern web frameworks such as Next.js, integrates with major marketing and analytics platforms like Google Tag Manager and Marketo, and uses AWS Cloudfront for hosting and CDN services. Security is robust with HTTPS enforced, appropriate security headers, and cookie consent mechanisms in place. However, explicit incident response and vulnerability disclosure information are not publicly available, which could be improved. Overall, the site demonstrates a high level of professionalism, security, and compliance, supporting Zendesk's strong market position in the customer service technology sector.

Detected Technologies

React (Next.js)Google Tag ManagerMarketoOneTrustAdobe Web SDKMicrosoft Authentication Library (MSAL)Cloudfront CDN

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Zendesk operates a SaaS business model focused on customer service and support software enhanced with AI capabilities. Its market positioning is strong, serving a broad customer base including enterprises, SMBs, and startups across multiple industries such as technology, retail, finance, healthcare, and telecommunications. The company maintains a global footprint with localized websites and language support. Zendesk's competitive advantages include its AI-driven product suite, extensive integrations, and a well-established brand. The company leverages partnerships and events like the Zendesk AI Summit to engage its ecosystem. Revenue streams are primarily subscription-based. The website content and structure indicate a focus on customer satisfaction, innovation, and trust-building.

Security Posture Analysis

Comprehensive Security Assessment

Zendesk's security posture is solid, with enforced HTTPS, presence of key security headers (X-Frame-Options, HSTS, X-XSS-Protection), and cookie consent aligned with GDPR requirements. The site avoids exposing sensitive data and uses modern authentication libraries. However, the absence of publicly available incident response contacts and vulnerability disclosure policies represents a compliance gap. No vulnerable libraries or security issues were detected in the analyzed content. The company demonstrates a mature security culture but could enhance transparency and readiness by publishing detailed security policies and response procedures.

Strategic Recommendations

Priority Actions for Security Improvement

1

Publish explicit incident response and security contact information on the website.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Zendesk

Description:

Ontdek onze AI-gedreven bekroonde klantenservicesoftware, vertrouwd door 200.000 klanten. Zorg voor tevreden klanten via sms, mobiele apparaten, telefoon, e-mail, live chat en social media.

Key Services:
AI agentsCopilotTicketing systemMessaging and live chatHelpcenterVoiceQuality assuranceWorkforce management
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
React (Next.js)Google Tag ManagerMarketoOneTrustAdobe Web SDKMicrosoft Authentication Library (MSAL)Cloudfront CDN
Frameworks:
Next.js
Platforms:
AWS Cloudfront
Performance:

fast

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Security headers present
  • Cookie consent with opt-in categories
  • No exposed sensitive data in HTML
  • Use of modern authentication libraries

Analytics & Tracking

Services:
Google AnalyticsMarketo Analytics
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Ad Networks:
Google Ads
Tracking Pixels:
MarketoGoogle Ads Conversion TrackingOneTrust
Marketing Tools:
MarketoOneTrust
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is fully accessible with no blocking or WAF challenges

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

40/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

100/100
Score
No issues found

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

25/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

50/100
Score

No SPF record found

HIGH

SPF helps prevent email spoofing

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
DMARC Details
Policy:reject
Subdomain Policy:none
Aggregate Reports:bwvlu6ki@ag.dmarcian-eu.com
Forensic Reports:bwvlu6ki@fr.dmarcian-eu.com

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

75/100
Score

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 41 days

Weak SSL Key Length

HIGH

SSL certificate uses 256-bit key, which is considered weak

Partial SSL/TLS Assessment

LOW

Completed 2 of 4 security checks due to time constraints

Certificate Details

Subject:zendesk.nl
Issuer:WE1
Valid Until:10/16/2025 (41 days)
SANs:zendesk.nl, *.zendesk.nl

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

70/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Transfer Lock Not Enabled

MEDIUM

Domain can be transferred without authorization

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

Domain Registration Details

Domain Age
11 years(mature)
Protection Level
noneDNSSEC OFF
Suspicious Indicators Detected
  • No domain protection locks enabled

DNS Records

A Records:104.18.64.136, 104.18.66.136, 104.18.65.136, 104.18.68.136, 104.18.67.136
AAAA Records:2606:4700::6812:4488, 2606:4700::6812:4088, 2606:4700::6812:4188, 2606:4700::6812:4288, 2606:4700::6812:4388
Name Servers:
beth.ns.cloudflare.comDNS only
walt.ns.cloudflare.comDNS only
SOA:Serial: 2378471334, TTL: 1800s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:41ms

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on a modern React-based framework (Next.js) with server-side rendering for performance. It uses AWS Cloudfront as CDN and hosting provider, ensuring fast global delivery. Integration with marketing and analytics tools like Marketo and Google Tag Manager is evident, supporting data-driven marketing. The site is mobile-optimized and accessible, with structured navigation and multilingual support. No technical debt or deprecated technologies were detected. The use of security headers and HTTPS indicates good security hygiene. Opportunities exist to improve transparency around security policies and incident response.
Analyze Another Website