Cisco Cisco IP Contact Center Release 4.6.1 Design Guide

Page of 388
C H A P T E R
 
8-1
Cisco Unified Contact Center Enterprise 7.0, 7.1, and 7.2 SRND
OL-8669-16
8
Securing Unified CCE
This chapter describes the importance of securing the Unified CCE solution and points to the various 
security resources available. It includes the following sections:
  •
  •
  •
  •
  •
  •
  •
  •
  •
  •
  •
  •
Introduction to Security
Achieving Unified CCE system security requires an effective security policy that accurately defines 
access, connection requirements, and systems management within your contact center. Once you have a 
good security policy, you can use many state-of-the-art Cisco technologies and products to protect your 
data center resources from internal and external threats and to ensure data privacy, integrity, and system 
availability.
An essential security resource is the Unified Communications Security Solution portal, accessible at 
This site contains important documents and references that are meant to aid the application architect in 
designing a secure and reliable Cisco Unified Communications environment with its endpoints, call 
control systems, transport networks, and applications.
As one of those applications in the Cisco Unified Communications network, Unified CCE security 
considerations at a high level are not very different than those of other applications making up a 
Cisco Unified Communications solution. Deployments of Unified CCE vary greatly and often call for 
complex network designs that require competence in all areas of Layer 2 and Layer 3 networking as well