Jump to: navigation, search

Introduction

This Guide provides an overview of the security risks and requirements inherent in a contact-center environment, and describes how Genesys addresses those risks.

Warning
Genesys software is not intended to be used in an unrestricted Internet-facing environment. Genesys strongly recommends that you use security features described in this document and elsewhere in combination with good system-security practices—including secure and/or encrypted file storage and the use of firewalls where appropriate.

Overview

The risks and threats inherent to data networks also apply to contact centers. In general, the risks common to contact center solutions can be broken down into the following categories:

This Guide is not an exhaustive study of all of the security features that Genesys offers. Many security features are documented elsewhere in the Genesys documentation suite. As these features evolve, so too will this document—to provide a concise one-stop reference for all of your security needs.

Security Deployment

This Guide describes each of the Genesys security features mentioned in the preceding sections. It also includes detailed deployment instructions for those features that can be installed either system-wide, or in a manner that is consistent for all products. If the deployment process differs between components or products, you are referred to appropriate product documentation for the specific steps.

Where part of the deployment of a feature is performed as part of another procedure, this document provides an overview of that part. For detailed instructions, you are referred to the appropriate product documentation.

Tip
If you are considering deploying Genesys in a complex environment with multiple users, roles, and credentials, Genesys strongly recommends that you retain an experienced security consultant or a Genesys Customer Care representative to review your configuration and security plan.

In Case of Emergency

If you have a problem or emergency related to the security of your Genesys system, do not hesitate to contact Genesys Customer Care at 1-888-GENESYS (436-3797) or customercare@genesys.com. Do not further jeopardize the safety of your system by discussing the situation in online message boards or applying any unapproved remedial software.

Security and Standards Compliance

The Genesys suite of products is designed to make up part of a fully functioning contact center solution, which may include certain non-Genesys components and customer systems. Genesys products are intended to provide customers with reasonable flexibility in designing their own contact center Solutions. As such, it is possible for a customer to use the Genesys suite of products in a manner that complies with the security-related business standards such as General Data Protection Regulation, ISO 27001/27002 (formerly 17799), HIPAA, PCI DSS etc. However, the Genesys products are merely tools to be used by the customer and cannot ensure or enforce compliance with these standards. It is solely the customer's responsibility to ensure that any use of the Genesys suite of products complies with these business standards. Genesys recommends that the customer take steps to ensure compliance with these business standards as well as any other applicable local security requirements.

New in This Release

The following new security features and functions have been introduced in release 8.5:

  • Kerberos authentication is supported by some components for user authentication.
  • Call recordings can be encrypted, then decrypted for feedback. See Encrypted Call Recordings.
  • When configuring TLS, you can specify the version of TLS protocol to use to secure connections.

Supporting Components information for all features has been updated as required.

Feedback

Comment on this article:

blog comments powered by Disqus
This page was last modified on May 22, 2018, at 22:35.