Updated on 2022-02-21 GMT+08:00

CEC Security Assurance

The CEC migrates businesses and data to the cloud, where system resources are shared by multiple enterprises. This section describes how the CEC ensures system security in this scenario.

The CEC ensures business security in terms of APIs, businesses, operations, and networks.

API Security

The CEC uses mechanisms such as encrypted data transmission and API authentication to ensure the security for enterprises to invoke APIs.

Business Security

The CEC uses mechanisms such as business data isolation and user permission control to ensure the security of enterprise contact center services.

Operation Security

The CEC management system ensures the security of management operations for the enterprise contact center based on mechanisms such as administrator permission control and operation log recording.

Network Security

The CEC uses firewalls and IP packet attack defense mechanisms at network borders to prevent malicious behavior from untrusted domains.

To sum up, the CEC provides a four-layer security mechanism to ensure the security of contact center businesses.