CEC Security Assurance
The CEC migrates businesses and data to the cloud, where system resources are shared by multiple enterprises. This section describes how the CEC ensures system security in this scenario.
The CEC ensures business security in terms of APIs, businesses, operations, and networks.
API Security
The CEC uses mechanisms such as encrypted data transmission and API authentication to ensure the security for enterprises to invoke APIs.
Business Security
The CEC uses mechanisms such as business data isolation and user permission control to ensure the security of enterprise contact center services.
Operation Security
The CEC management system ensures the security of management operations for the enterprise contact center based on mechanisms such as administrator permission control and operation log recording.
Network Security
The CEC uses firewalls and IP packet attack defense mechanisms at network borders to prevent malicious behavior from untrusted domains.
To sum up, the CEC provides a four-layer security mechanism to ensure the security of contact center businesses.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot