Freshservice Incident Management for Cyber: What Is Missing
Freshworks announced the acquisition of FireHydrant on 2025-12-15, with FireHydrant becoming "the Incident Management and Reliability layer inside Freshservice." For IT service management and SRE-shaped reliability work, that combination is coherent. For cyber incident response specifically, the combined offering leaves a clear set of gaps. This article maps them.
What the combined Freshservice + FireHydrant offering covers
Post-integration, the joint platform is shaping up as a unified ServiceOps suite covering:
- IT service desk, ticketing, change management (Freshservice native)
- Service catalog and asset management (Freshservice native)
- SRE incident declaration, response, and retrospective (FireHydrant)
- On-call scheduling and alerting (FireHydrant Signals)
- Public and private status pages (FireHydrant)
- SRE-shaped runbooks with conditional triggers (FireHydrant)
- AI summaries, status updates, meeting transcripts, retro enhancement (FireHydrant Enterprise tier)
This is a coherent ITSM + reliability bundle. For a 200-2,000 person SaaS company running its IT and engineering operations, the offering is reasonable.
What the combined offering does not cover for cyber-IR
The following capabilities are not in either Freshservice or FireHydrant as of May 2026, and are not on the publicly stated joint roadmap:
1. Parallel regulatory clocks
A modern cyber incident routinely triggers multiple regulatory notification deadlines simultaneously: GDPR Article 33 (72 hours), SEC Item 1.05 (4 business days from materiality), NY DFS 500.17 (72 hours), HIPAA (60 days), state breach laws, NIS2, DORA. Each has a different trigger condition, a different filing format, and different exemption rules. A cyber-IR platform must compute these in parallel based on incident facts. Neither product has this capability.
2. Hash-chained, signed defensible record
The artifact regulators, insurers, and opposing counsel ask for at the end of a cyber incident is a tamper-evident record, not a free-form retrospective. Append-only, SHA-256 chained, Ed25519-signed, third-party verifiable long after the incident. Neither Freshservice nor FireHydrant produces this artifact.
3. Structural attorney-client privilege
Cyber-IR generates communications that need to be privileged: counsel review of breach notifications, executive deliberations on materiality, panel firm scoping calls. Privilege under a defensible model is set by structure (channel scope, counsel-of-record asserted at the org level), not by per-message stickers. Neither product has this concept.
4. Cyber insurance policy as a computable entity
Cyber insurance policies have first-notice clauses (carrier first vs FBI first vs regulator first), cooperation obligations, retention requirements, and exclusion conditions. Missing first-notice mismatches is the most common cause of voided coverage in incidents over $1M. The policy needs to be a computable entity that surfaces clauses at the moment of decision. ITSM ticketing does not produce this.
5. Panel firm directory
A cyber incident engages a panel: counsel of record, forensics, PR, notification vendor. The panel must be surfaced in workflow at the moment of need, with primary contacts, retainer status, and scope of engagement. ITSM has vendors and assets, but not the panel-firm-with-engagement-context model.
6. Cyber-grounded AI
Notification drafting, materiality assessment, and timeline construction need an AI corpus of NIST 800-61, ISO/IEC 27035, MITRE ATT&CK, SEC Final Rule 33-11216, GDPR Article 33, EDPB Guidelines 9/2022, OFAC ransomware advisory, and CISA #StopRansomware. FireHydrant's AI is summary-and-comms shaped. Freshservice's AI is helpdesk-shaped. Neither corpus produces useful breach notification text.
7. Tabletop exercise engine
Cyber maturity is built between incidents through tabletop exercises with structured scenarios (ransomware, BEC, insider, supply chain, data breach, cloud compromise). Neither product has a tabletop module.
8. Structured 8-section AAR
Regulator-ready after-action reviews require structured sections: Executive Summary, Timeline, Root Cause, Impact Assessment, Containment Effectiveness, Lessons Learned, Control Improvements, Regulatory Implications. FireHydrant retrospectives are free-form. Freshservice does not have a retrospective module.
9. Six named IRC roles plus backups
Cyber incidents require a defined human command structure: Incident Commander, Scribe, Communications Lead, Legal Liaison, Technical Lead, Executive Sponsor, with named backups. SRE on-call rotations are excellent for paging the right engineer. They are not the same as the human command structure required for a regulated cyber incident.
10. Cyber stack integrations
FireHydrant has 37+ integrations across observability, alerting, ticketing, and DevOps. The cyber stack is conspicuously absent: no SIEM (Splunk, Sentinel, Chronicle), no EDR (CrowdStrike, SentinelOne, Defender), no threat intel (Recorded Future, Mandiant), no GRC (OneTrust, ServiceNow GRC), no legal hold (Exterro, Logikcull). Freshservice does not add these.
Why the gaps will likely persist
The 12 to 18 months following an acquisition of this shape typically see the acquired engineering team focus on integration with the acquirer's product line. Net-new feature work slows. Sales motion consolidates into the acquirer's existing playbook. Product roadmap items not aligned with the acquirer's strategic direction tend to deprioritize.
Freshservice's strategic direction is ITSM consolidation. Adding cyber-IR features (regulatory clocks, hash chain, privilege, insurance carrier integration, panel firm directory, tabletop engine) would expand FireHydrant's product scope into a new category that Freshservice has no DNA in and no current customers asking for. The economic logic favors deepening the ITSM + SRE bundle.
Implication for cyber-IR teams
A team currently using FireHydrant for SRE incidents may continue to do so without disruption. The acquisition does not break that use case. A team that needs cyber-IR specifically should plan around an alternative tool now rather than waiting on a Freshservice cyber-IR roadmap that is unlikely to ship in the integration window.
The recommended pattern is coexistence: keep the Freshservice + FireHydrant bundle for IT operations and SRE; add a Cyber Incident Response Management (CIRM) platform for cyber-IR; webhook between them at the classification edge. SRE incidents stay where they are. Cyber incidents go to the right tool.
Cyber-IR is a different category
Keep your ITSM and SRE tools. Run cyber-IR in a platform built for it. 7-day free trial. No credit card.
Start your 7-day free trial