Discover the top service management leaders — get the latest analyst report now.
The word xurent on a black background
Platform
Solutions
Platform
Features

Solutions

IT Service Management

AI-powered ITSM for the modern enterprise

IT Operations Management

Unified, future-forward IT Operations

Managed Service Providers

AI-powered MSP service delivery

Enterprise Service Management

Unified ESM platform built for collaboration

Xurrent AI

Eliminate manual tasks, optimize workflows, and deliver faster resolutions.

Explore Ai

Platform

Ai Service Desk

AI-driven incident management

Account Trusts

Secure multi-organization collaboration

Workflow Automation

No-code AI-powered orchestration

Integrations Platform

Secure, API-first integrations

ITSM Analytics

Real-time insights, 400+ reports

Xurrent AI

Eliminate manual tasks, optimize workflows, and deliver faster resolutions.

Explore Ai

Features

Ai Automations

Eliminates manual tasks, optimizes workflows, and delivers faster resolutions.

Self-Service Portal

Request, manage, and track service needs anywhere, on any device.

Incident Management

Enhance service requests and optimize collaboration for faster resolution

Integrations Library

Connect Xurrent® with other solutions and platforms

Knowledge Management

Streamline article creation, boost efficiency, improved problem resolution.

Xurrent favicon logo on transparent background
All Features

Product engineering, Web & Mobility solutions and Talent augmentation to help you with your digital strataegy.

Explore All Features
Platform
Solutions
IT Service Management

AI-powered ITSM for the modern enterprise

IT Operations Management

Unified, future-forward IT Operations

Managed Service Providers

AI-powered MSP service delivery

Enterprise Service Management

Unified ESM platform built for collaboration

Platform
Ai Service Desk

AI-driven incident management

Account Trusts

Secure multi-organization collaboration

Integrations Platform

Secure, API-first integrations

Workflow Automation

No-code AI-powered orchestration

ITSM Analytics

Real-time insights, 400+ reports

Features
AI Automations

Eliminates manual tasks, optimizes workflows, and delivers faster resolutions.

Incident Management

Enhance service requests and optimize collaboration for faster resolution

Knowledge Management

Streamline article creation, boost efficiency, improved problem resolution.

Self-Service Portal

Request, manage, and track service needs anywhere, on any device.

Integrations Library

Connect Xurrent® with other solutions and platforms

All Features

Product engineering, Web & Mobility solutions and Talent augmentation to help you with your digital strataegy.

Resources
Success Stories
Blog
Webinars
Datasheets
Whitepapers
Product Updates
Support

Success Stories

Real customer results with ITSM

View All
XAL Lighting

XAL Lighting replaced their outdated ITSM tool with Xurrent, achieving 80% self-service adoption and "absolutely perfect" implementation in just 3 months.

Guna

Discover how Guna, a leading homeopathic manufacturer, transformed their IT service management with Xurrent's user-friendly platform in just two months.

Acun Medya

Acun uses Xurrent for its complete enterprise service management. The platform has proven to reduce service complexity across the enterprise — a primary goal when searching for a new provider.

blog

Insights & updates from our experts

View All
The case for unified Incident Management: why silos hurt response times

Discover why fragmented incident response tools cost organizations thousands per hour and how unified incident management transforms chaos into coordination.

From silos to synergy: The rise of ESM as a business unifier

Transform your organization from isolated silos to unified synergy with Enterprise Service Management. Discover how ESM breaks down barriers and boosts efficiency.

Meet Denise Joyal: Customer Success Manager at Xurrent, who shapes seamless support by day and beautiful ceramics by night

Meet Denise Joyal: Customer Success Manager at Xurrent, who shapes seamless support by day and beautiful ceramics by night

Webinars

Upcoming and recorded webinars from our experts.

View All
The ESM Playbook: Delivering Impact and Reducing Friction

In this session, we will share what we have learned from using Xurrent to support our own internal operations, and how that experience has shaped our view of what truly works when rolling out ESM across an organization.

Xurrent in Action: Join a Live Demo!

IT doesn’t have to be complicated. Join our LIVE Xurrent demo to see what easy looks like.

Modernizing the Service Desk: Strategies for a Frictionless Experience

In this session, we'll cover the shift toward automation and intelligent triage, the importance of real-time collaboration across IT functions, and how integrating service data across platforms can reduce friction and improve outcomes.

Datasheets

Quick-reference guides to Xurrent features

View All
Xurrent for Education

Universities and further education colleges all face the challenge of attracting the best staff and students. Both these groups have increasing expectations of the services they consume. Learn how 4me can help with everything from network access to student welfare, facilities and accommodation.

Read More
Xurrent ESM Overview

As part of their digital transformation, organizations are improving the support that is provided by the different support domains, like HR, IT, Purchasing and Legal. By making it easier for their employees to obtain support when they are stuck with a question or need assistance from another department, organizations are improving productivity and job satisfaction.

Read More
Xurrent for HR

Streamline and automate HR service delivery and provide the service your employees want and deserve. They will get the service they need, when they need it, whether it’s via the web, the Xurrent app, or virtual agent. The combination of efficient processes and workflows and an easy-to-use Self-Service portal enables better and more productive employee service experiences.

Read More

Whitepapers

Expert ITSM & automation insights

View All
Xurrent and USM

A Powerful Combination

Three Simple Reasons Why Global ITSM Initiatives Fail

Getting local, regional, and global IT support organizations to work together to use the same IT service management tool — especially as a large, global enterprise — is no small task.

Tooling Up for Service Desk Outsourcing

This paper discusses these three options and proposes an interesting fourth one, that eliminates the disadvantages of the others.

Product Updates

Stay up to date on new features and updates.

View All
Specialist Updates: Your inbox, your way.

Discover Xurrent's new Specialist Interface updates with three customizable layout options: Single Pane, Two Pane, and Dynamic View for personalized workflows.

Read More
Configure Self Service Search

It is now possible to configure self-service search to show only the record types you want your end users to see.

Read More
Workflow and Project Summary Inline in Email

Email template variables have been added to approval (project) tasks to include the project or workflow summary inline in the approval email.

Read More

Support

We're here to help

Product Support

We are here to help 24/7

Community

Connect with other Xurrent Users

Training

Get insights and tips on how to get the most out of Xurrent

Developer Portal

Apps, APIs, and updates

Xurrent AI

Eliminate manual tasks, optimize workflows, and deliver faster resolutions.

Explore Ai
Resources
Success Stories
Blog
Webinars
Datasheets
Whitepapers
Product Updates
Support
Product Support

We are here to help 24/7

Community

Connect with other Xurrent Users

Training

Get insights and tips on how to get the most out of Xurrent

Developer Portal

Apps, APIs, and updates

Partners
Partner Finder

Our global partner ecosystem

Partner Program

Learn about our partner program

Awards

Award-winning, trusted ITSM

Become a Partner

Join Xurrent's global partner network

Company
About Us
Careers
Events
Press Releases
Get a Demo
right-arrow Created with Sketch.
en
English
German

Search

Signup
Get Started
Get Started
right-arrow Created with Sketch.

Responsible Disclosure Policy

TERMS
Terms of UseCustomer AgreementData Processing Addendum (DPA)API Terms of ServiceAcceptable Use PolicyBrand Guidelines
COMPLIANCE
Privacy PolicySecurityResponsible DisclosureApplicant Privacy Notice & PolicyAccessibility StatementGDPR ComplianceSubprocessorsCookie Policy

Last Updated: 30 July 2025

‍

At Xurrent, Inc. (“Xurrent”) we are committed to ensuring the security of our systems and the privacy of our users. We value the efforts of security researchers and ethical hackers who help us identify and remediate potential vulnerabilities. This Responsible Disclosure Policy provides a general guideline for submitting vulnerability reports to us.

Reporting A Security Vulnerability

If you believe you have discovered a security vulnerability in any of our systems, please report it to us immediately by following these steps:

  • Email Us: Send a detailed email to security@xurrent.com
  • Include Details: In your report, please include the following information:
    • Vulnerability Description: A clear and concise description of the vulnerability.
    • Steps to Reproduce: Detailed steps on how to reproduce the vulnerability.
    • Impact: Explain the potential impact of the vulnerability.
    • Proof of Concept: Any relevant proof of concept code, screenshots, or videos.
    • Affected Systems/URLs: Specify the affected systems, applications, or URLs.
    • Your Contact Information: Your name, email address, and any preferred method of contact (e.g., PGP key).
  • Encrypt Your Report (Optional but Recommended): If you are comfortable, you may encrypt your report using our PGP key, which can be found on our website.

Our Commitment

Upon receiving your vulnerability report, we commit to the following:

  • Acknowledgement: We will acknowledge receipt of your report within 3 business days.
  • Investigation: We will investigate the reported vulnerability.
  • Communication: We will keep you informed of our progress throughout the investigation and remediation process.
  • Remediation: We will make every effort to address and remediate valid vulnerabilities promptly, based on their severity.
  • Recognition: For valid and impactful vulnerabilities reported in accordance with this policy, we will offer public recognition (with your consent) in our "Hall of Fame" or a similar acknowledgment.

Guidelines for Responsible Disclosure

To ensure a smooth and productive disclosure process, we kindly request that you adhere to the following guidelines:

  • Only perform assessments on systems and applications that are explicitly within the scope of this policy.
  • Use your own test account for all testing activities; do not use customer accounts under any circumstances.
  • Conduct all testing in good faith, with the primary goal of improving our security posture.
  • Do not access, modify, or delete any user data without explicit written permission.
  • Do not attempt to compromise the confidentiality, integrity, or availability of our systems or customer data.
  • Do not circumvent or bypass any privacy or security controls we have in place.
  • Avoid any actions that could lead to degradation of service or denial of service (DoS/DDoS) for our users.
  • Do not use automated scanners or tools that may generate excessive traffic or cause disruptions.
  • Social engineering, phishing, or physical attacks against our employees, customers, vendors or infrastructure are strictly prohibited.

Responsible Disclosure

  • Do not publicly share any details of identified vulnerabilities including proof of concept code, screenshots, or technical information without explicit written consent from Xurrent.

Out-of-Scope Vulnerabilities

The following are not considered security vulnerabilities and are out of scope for this program:

Findings that do not demonstrably impact the confidentiality, integrity, security, or availability of our systems, data, or users are considered informational and out of scope. This includes "good-to-have" improvements like general hardening recommendations, security best practices, or hygiene issues that do not pose a practical or exploitable risk.

  • Clickjacking on non-sensitive or static content pages
  • Rate limiting or brute-force attacks on endpoints that do not expose sensitive data
  • Missing or non-standard HTTP security headers (e.g., X-Frame-Options, Content-Security-Policy) without a demonstrable security impact
  • Vulnerabilities in third party services, libraries, or software not maintained or controlled by Xurrent
  • Self XSS, or XSS that requires the user to input code into their own browser console
  • Social engineering or phishing attacks requiring significant user interaction or external influence
  • Recommendations or theoretical weaknesses without concrete, reproducible exploit paths
  • Automated scanner output without manual validation, impact analysis, or proof-of-concept
  • Use of known/weak cipher suites unless it results in a practical, exploitable vulnerability
  • Missing HttpOnly or Secure flags on non-sensitive cookies
  • Use of deprecated libraries without a clear and demonstrable vulnerability
  • CSRF on logout or non-sensitive actions that do not modify user data or settings
  • Email bombing or spam that does not bypass rate limits or cause service disruption
  • Open redirects without a proven exploit chain leading to sensitive data theft or phishing

In-Scope Targets

  • https://www.xurrent.com/
  • https://statuscast.com/
  • https://www.zenduty.com/
  • Android and iOS mobile applications for Xurrent and Zenduty

Hall Of Fame

While Xurrent does not provide any monetary reward for responsibly disclosing unique vulnerabilities and working with us to remediate them, we would like to convey our deepest gratitude to the security researchers publicly. We will add your name to our Hall of Fame.

Safe Harbor

Xurrent will not pursue legal action against individuals who:

  • Act in good faith and follow this Responsible Disclosure Policy;
  • Do not access, alter, or destroy user data;
  • Do not disrupt our services, compromise privacy, or take any other harmful action; and
  • Limit testing to in scope systems only.

If your research complies with this policy, it will not be considered by Xurrent to be unauthorized activity.

This safe harbor does not apply to actions involving malicious intent, data theft, service disruption or that are otherwise excluded by this policy, or actions that violate applicable laws. If you are unsure whether a particular activity is covered, please contact us at security@xurrent.com before proceeding.

Thank you for helping us keep our systems secure.

‍

Get Started Today

The future of service management starts now. Share your details, and our team of Xurrent experts will set up a personalized demo to show you exactly how we can transform your operations.

Get Started
right-arrow Created with Sketch.
The google play logo with the words get it on
A black and white sign with an apple on it
A blue background with five stars and the words peerinsights read our review
Read Xurrent reviews on G2
Xurrent logo on transparent background with white text
Solutions
IT Service ManagementManaged Service ProvidersEnterprise Service ManagementIT Operations Management
Platform
AI Service DeskWorkflow AutomationITSM AnalyticsIntegrations PlatformAccount Trusts
Resources
About UsCustomersBlogWhitepapersDev PortalStandard Integrations
Connect
SupportReleasesBook a DemoCommunityTrainingCareers
© 2025 Xurrent. All rights reserved.
Service StatusPrivacy PolicyTerms of Service
Cookie Settings
EnglishGerman