Jump to: navigation, search


This Guide provides an overview of the security risks and requirements inherent in a contact-center environment, and describes how Genesys addresses those risks.

Genesys software is not intended to be used in an unrestricted Internet-facing environment. Genesys strongly recommends that you use security features described in this document and elsewhere in combination with good system-security practices—including secure and/or encrypted file storage and the use of firewalls where appropriate.


The risks and threats inherent to data networks also apply to contact centers. In general, the risks common to contact center solutions can be broken down into the following categories:

This Guide is not an exhaustive study of all of the security features that Genesys offers. Many security features are documented elsewhere in the Genesys documentation suite. As these features evolve, so too will this document—to provide a concise one-stop reference for all of your security needs.

Security Deployment

This Guide describes each of the Genesys security features mentioned in the preceding sections. It also includes detailed deployment instructions for those features that can be installed either system-wide, or in a manner that is consistent for all products. If the deployment process differs between components or products, you are referred to appropriate product documentation for the specific steps.

Where part of the deployment of a feature is performed as part of another procedure, this document provides an overview of that part. For detailed instructions, you are referred to the appropriate product documentation.

If you are considering deploying Genesys in a complex environment with multiple users, roles, and credentials, Genesys strongly recommends that you retain an experienced security consultant or a Genesys Customer Care representative to review your configuration and security plan.

In Case of Emergency

If you have a problem or emergency related to the security of your Genesys system, do not hesitate to contact Genesys Customer Care at 1-888-GENESYS (436-3797) or customercare@genesys.com. Do not further jeopardize the safety of your system by discussing the situation in online message boards or applying any unapproved remedial software.

Security and Standards Compliance

The Genesys suite of products is designed to make up part of a fully functioning contact center solution, which may include certain non-Genesys components and customer systems. Genesys products are intended to provide customers with reasonable flexibility in designing their own contact center Solutions. As such, it is possible for a customer to use the Genesys suite of products in a manner that complies with the security-related business standards such as General Data Protection Regulation, ISO 27001/27002 (formerly 17799), HIPAA, PCI DSS etc. However, the Genesys products are merely tools to be used by the customer and cannot ensure or enforce compliance with these standards. It is solely the customer's responsibility to ensure that any use of the Genesys suite of products complies with these business standards. Genesys recommends that the customer take steps to ensure compliance with these business standards as well as any other applicable local security requirements.

Our Pure Engage Cloud infrastructure is compliant with industry standards such as PCI DSS, SOC2 Type II, ISO 27001, and HIPAA.

New in This Release

The following new security features and functions have been introduced in release 8.5:

  • Kerberos authentication is supported by some components for user authentication.
  • Call recordings can be encrypted, then decrypted for feedback. See Encrypted Call Recordings.
  • When configuring TLS, you can specify the version of TLS protocol to use to secure connections.

Supporting Components information for all features has been updated as required.

This page was last edited on July 23, 2019, at 10:59.
Comments or questions about this documentation? Contact us for support!