๐ŸŽ™๏ธ New live webinar! ๐ŸŽ™๏ธย ย Whatโ€™s Next in ITSM? Trends Shaping the Future of Service Management ๐Ÿ‘‰ Register today
The word xurent on a black background
Platform
Solutions
Platform
Features

Solutions

IT Service Management

AI-powered ITSM for the modern enterprise

IT Operations Management

Unified, future-forward IT Operations

Managed Service Providers

AI-powered MSP service delivery

Enterprise Service Management

Unified ESM platform built for collaboration

Xurrent AI

Eliminate manual tasks, optimize workflows, and deliver faster resolutions.

Explore Ai

Platform

Ai Service Desk

AI-driven incident management

Account Trusts

Secure multi-organization collaboration

Workflow Automation

No-code AI-powered orchestration

Integrations Platform

Secure, API-first integrations

ITSMย Analytics

Real-time insights, 400+ reports

Xurrent AI

Eliminate manual tasks, optimize workflows, and deliver faster resolutions.

Explore Ai

Features

Ai Automations

Eliminates manual tasks, optimizes workflows, and delivers faster resolutions.

Self-Service Portal

Request, manage, and track service needs anywhere, on any device.

Incident Management

Enhance service requests and optimize collaboration for faster resolution

Integrations Library

Connect Xurrentยฎ with other solutions and platforms

Knowledge Management

Streamline article creation, boost efficiency, improved problem resolution.

All Features

Product engineering, Web & Mobility solutions and Talent augmentation to help you with your digital strataegy.

Explore All Features
Platform
Solutions
IT Service Management

AI-powered ITSM for the modern enterprise

IT Operations Management

Unified, future-forward IT Operations

Managed Service Providers

AI-powered MSP service delivery

Enterprise Service Management

Unified ESM platform built for collaboration

Platform
Ai Service Desk

AI-driven incident management

Account Trusts

Secure multi-organization collaboration

Integrations Platform

Secure, API-first integrations

Workflow Automation

No-code AI-powered orchestration

ITSM Analytics

Real-time insights, 400+ reports

Features
AI Automations

Eliminates manual tasks, optimizes workflows, and delivers faster resolutions.

Incident Management

Enhance service requests and optimize collaboration for faster resolution

Knowledge Management

Streamline article creation, boost efficiency, improved problem resolution.

Self-Service Portal

Request, manage, and track service needs anywhere, on any device.

Integrations Library

Connect Xurrentยฎ with other solutions and platforms

All Features

Product engineering, Web & Mobility solutions and Talent augmentation to help you with your digital strataegy.

Resources
Success Stories
Blog
Datasheets
Whitepapers
Product Updates
Support

Success Stories

Real customer results with ITSM

View All
Acun Medya

Acun uses Xurrent for its complete enterprise service management. The platform has proven to reduce service complexity across the enterprise โ€” a primary goal when searching for a new provider.

Hans Anders

Learn how Hans Anders Retail Group improved efficiency and results with Xurrentโ€™s unified Enterprise Service Management solution, connecting stores with the service organization for timely and effective service delivery.

Raet

Raet enhanced MSP operations by streamlining service delivery through a unified platform integrating IT, customer support, applications, and HR services. It features secure data storage in the Netherlands and Eurozone, a user-friendly design for easy adoption, and seamless migration of 15,000 requests with an audit trail.

blog

Insights & updates from our experts

View All
The future of the IT help desk Is AI in 2025

Discover how an AI service desk can streamline your support operations, boost efficiency, and improve customer satisfaction. Read the article now!

The best Enterprise Service Management (ESM) tools in 2025

Discover what Enterprise Service Management is and how it can enhance efficiency and collaboration in your organization. Read more to learn its benefits.

Workflow automation in 2025: Everything you need to know in one comprehensive guide

Discover how AI-powered workflow automation transforms business efficiency in 2025. Learn the 5 levels of maturity and best practices for implementation.

Datasheets

Quick-reference guides to Xurrent features

View All
Xurrent for Education

Universities and further education colleges all face the challenge of attracting the best staff and students. Both these groups have increasing expectations of the services they consume. Learn how 4me can help with everything from network access to student welfare, facilities and accommodation.

Read More
Xurrent ESM Overview

As part of their digital transformation, organizations are improving the support that is provided by the different support domains, like HR, IT, Purchasing and Legal. By making it easier for their employees to obtain support when they are stuck with a question or need assistance from another department, organizations are improving productivity and job satisfaction.

Read More
Xurrent for HR

Streamline and automate HR service delivery and provide the service your employees want and deserve. They will get the service they need, when they need it, whether itโ€™s via the web, the Xurrent app, or virtual agent. The combination of efficient processes and workflows and an easy-to-use Self-Service portal enables better and more productive employee service experiences.

Read More

Whitepapers

Expert ITSM & automation insights

View All
Xurrent and USM

A Powerful Combination

Three Simple Reasons Why Global ITSM Initiatives Fail

Getting local, regional, and global IT support organizations to work together to use the same IT service management tool โ€” especially as a large, global enterprise โ€” is no small task.

Tooling Up for Service Desk Outsourcing

This paper discusses these three options and proposes an interesting fourth one, that eliminates the disadvantages of the others.

Product Updates

Stay up to date on new features and updates.

View All
Configure Self Service Search

It is now possible to configure self-service search to show only the record types you want your end users to see.

Read More
Workflow and Project Summary Inline in Email

Email template variables have been added to approval (project) tasks to include the project or workflow summary inline in the approval email.

Read More
N-able's N-central Integration in Xurrent App Store

The N-able N-central app is now available from the Xurrent App Store, for integrated RMM capabilities.

Read More

Support

We're here to help

Product Support

We are here to help 24/7

Community

Connect with other Xurrent Users

Training

Get insights and tips on how to get the most out of Xurrent

Developer Portal

Apps, APIs, and updates

Xurrent AI

Eliminate manual tasks, optimize workflows, and deliver faster resolutions.

Explore Ai
Resources
Success Stories
Blog
Datasheets
Whitepapers
Product Updates
Support
Product Support

We are here to help 24/7

Community

Connect with other Xurrent Users

Training

Get insights and tips on how to get the most out of Xurrent

Developer Portal

Apps, APIs, and updates

Partners
Partner Finder

Our global partner ecosystem

Partner Program

Learn about our partner program

Awards

Award-winning, trusted ITSM

Become a Partner

Join Xurrent's global partner network

Company
About Us
Careers
Events
Get a Demo
right-arrow Created with Sketch.

Search

Get a Demo
right-arrow Created with Sketch.

Acceptable Use Policy

TERMS
Terms of UseCustomer AgreementData Processing Addendum (DPA)API Terms of ServiceAcceptable Use PolicyBrand Guidelines
COMPLIANCE
Privacy PolicySecurityApplicant Privacy Notice & PolicyAccessibility StatementGDPR ComplianceSubprocessorsCookie Policy

Rev May 28, 2024

โ€

This acceptable use policy (this โ€œPolicyโ€) describes prohibited uses of the Xurrent SaaS products and services (collectively the โ€œServiceโ€), the Xurrent platform through which products and Services are available (the โ€œPlatformโ€) and the website located at https://Xurrent.com or https://www.xurrent.com (the โ€œXurrent Websiteโ€). The examples described in this Policy are not exhaustive. We may modify this Policy at any time by posting a revised version on the Xurrent Website. By using the Service or accessing the Xurrent Website, you agree to the latest version of this Policy. If you violate the Policy or authorize or help others to do so, we may suspend or terminate your use of the Service.

No Illegal, Harmful, or Offensive Use or Content

You may not use the Service or the Xurrent Website for any illegal, harmful or offensive use, or to transmit, store, display, distribute or otherwise make available content that is illegal, harmful, or offensive. Prohibited activities or content include:

  • Illegal Activities โ€” Any illegal activities, including advertising, transmitting, promoting, or facilitating illegal activities.
  • Harmful or Fraudulent Activities โ€” Activities that may be harmful to our users, operations, or reputation, including offering or disseminating fraudulent goods, services, schemes, or promotions, or engaging in other deceptive practices.
  • Infringing Content โ€” Content that infringes or misappropriates the intellectual property or proprietary rights of others.
  • Offensive Content โ€” Content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable.
  • Harmful Content โ€” Content or other computer technology that may damage, interfere with, surreptitiously intercept, or expropriate any system, program, or data, including viruses, Trojan horses, worms, time bombs, or cancelbots.
  • Hacking Activities โ€” Activities that include modifying, reverse-engineering, hacking or attempting to hack or otherwise discover any underlying ideas, algorithms or source code of a proprietary nature or vulnerabilities of the Services or Xurrentโ€™s Platform.
  • Competitive Activities โ€” Activities that include copying the Services or Xurrentโ€™s Platform, or any part, feature, function or user interface thereof, or accessing the Services or Xurrentโ€™s Platform in order to build a competitive product or service.
  • Tampering Activities โ€” Activities that include modifying, altering, tampering with or creating a derivative work of any software included in the Services or Xurrentโ€™s Platform.
  • Interfering Activities โ€” Activities that include using the Services or Xurrentโ€™s Platform to interfere with or disrupt the integrity or performance of the Services or Xurrentโ€™s Platform (or their components), or to attempt to gain unauthorized access to the Services or Xurrentโ€™s Platform, or any related systems or networks.

No Security Violations

You may not use the Service to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a โ€œSystemโ€). Prohibited activities include:

  • Unauthorized Access โ€” Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.
  • Interception โ€” Monitoring of data or traffic on a System without permission.
  • Falsification of Origin โ€” Forging TCP-IP packet headers, email headers, or any part of a message describing its origin or route. This prohibition does not include the use of aliases or anonymous remailers.

No Network Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. In addition, you do not have permission to abuse our networks or use our networks to abuse other networks. Prohibited activities include:

  • Monitoring or Crawling โ€” Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.
  • Denial of Service (DoS) โ€” Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.
  • Intentional Interference โ€” Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.
  • Operation of Certain Network Services โ€” Operating network services like open proxies, open mail relays, or open recursive domain name servers.
  • Excessive Use of Bandwidth โ€” The Serviceโ€™s bandwidth limitations vary depending on the features you use. If we determine that your bandwidth usage is excessive compared to other users of similar features, we reserve the right to suspend your access, throttle your traffic, or otherwise limit your activity until you have reduced your bandwidth consumption.
  • Avoiding System Restrictions โ€” Using manual or electronic means to avoid any use limitations place on a System, such as access and storage restrictions.

No Email Abuse

You will not distribute, publish, send, or facilitate unsolicited mass emailings, promotions, advertising, or solicitations (like โ€œspamโ€), including commercial advertising and informational announcements. You will not alter or obscure mail headers or assume a senderโ€™s identity without the senderโ€™s explicit permission. You will not collect replies to messages sent from another internet service provider if those messages violate this Policy or the acceptable use policy of that provider.

Our Monitoring and Enforcement

We reserve the right, but do not assume the obligation, to investigate any violation of this Policy or misuse of the Service or the Xurrent Website. We may investigate violations of this Policy or misuse of the Service or Xurrent Website; or remove, disable access to, or modify any content or resource that violates this Policy or any other agreement we have with you for use of the Service or the Xurrent Website. We may report any activity that we suspect violates any law or regulation to appropriate law enforcement officials, regulators, or other appropriate third parties. Our reporting may include disclosing appropriate customer information. We also may cooperate with appropriate law enforcement agencies, regulators, or other appropriate third parties to help with the investigation and prosecution of illegal conduct by providing network and systems information related to alleged violations of this Policy.

Reporting of Violations of this Policy

If you become aware of any violation of this Policy, you will immediately notify us and provide us with assistance, as requested, to stop or remedy the violation. To report any violation of this Policy, please send an email to support@Xurrent.com.

โ€

Get started today

The future of service management starts now. Share your details, and our team of Xurrent experts will set up a personalized demo to show you exactly how we can transform your operations.

Get a Demo
right-arrow Created with Sketch.
The google play logo with the words get it on
A black and white sign with an apple on it
A blue background with five stars and the words peerinsights read our review
Read Xurrent reviews on G2
Solutions
IT Service ManagementManaged Service ProvidersEnterprise Service ManagementIT Operations Management
Platform
AI Service DeskWorkflow AutomationITSM AnalyticsIntegrations PlatformAccount Trusts
Resources
About UsCustomersBlogWhitepapersDev Portal
Connect
SupportReleasesBook a DemoCommunityTrainingCareers
ยฉ 2025 Xurrent. All rights reserved.
Service StatusPrivacy PolicyTerms of Service
Cookie Settings
EnglishGerman