Is Your Genesys Environment Secure? (Part Two)


Well it’s the final day of Genesys G-Force 2016 and what a ride it has been so far. Thank you to everyone who has stopped by our booth in the Partner Pavilion, it was great to meet so many like-minded industry experts.

With the event nearing its end, it is time to conclude our series on Genesys CX security. Previously we covered important points related to the security of sensitive information stored on your Genesys ecosystem, along with some of the challenges “off-the-shelf” security scanning tools may have testing Genesys integration with your network stack. For this final post, we will continue to dig deeper and ask you some challenging security questions around your Genesys ecosystem.

Read More
By Alex Boisseau on Oct 6, 2016 12:37:31 PM

Is Your Genesys Environment Secure? (Part One)

With Genesys G-Force 2016 only days away, we have been walking you through some of the security challenges organizations face when using the world’s number one customer experience platform.

Previously we spoke about the unconventional ways that Genesys components use or integrate with existing technology. We also described how Genesys uses a combination of proprietary and industry standard protocols and configurations throughout their applications, and the challenges this presents to standard testing procedures.

Read More
By Alex Boisseau on Sep 28, 2016 1:41:42 PM