{"id":389313,"date":"2022-01-28T08:11:30","date_gmt":"2022-01-28T16:11:30","guid":{"rendered":"https:\/\/blog.webex.com\/uncategorized-zh-hant\/webex-%e5%b9%b3%e5%8f%b0%e6%88%90%e7%82%ba%e5%8d%94%e4%bd%9c%e5%ae%89%e5%85%a8%e9%a0%98%e5%9f%9f%e9%a0%98%e5%b0%8e%e5%93%81%e7%89%8c%e7%9a%84-4-%e5%80%8b%e5%8e%9f%e5%9b%a0\/"},"modified":"2022-01-28T08:11:30","modified_gmt":"2022-01-28T16:11:30","slug":"webex-%e5%b9%b3%e5%8f%b0%e6%88%90%e7%82%ba%e5%8d%94%e4%bd%9c%e5%ae%89%e5%85%a8%e9%a0%98%e5%9f%9f%e9%a0%98%e5%b0%8e%e5%93%81%e7%89%8c%e7%9a%84-4-%e5%80%8b%e5%8e%9f%e5%9b%a0","status":"publish","type":"post","link":"https:\/\/blog.webex.com\/zh-hant\/%e5%8d%94%e5%90%8c%e5%90%88%e4%bd%9c\/%e6%b7%b7%e5%90%88%e8%be%a6%e5%85%ac\/webex-%e5%b9%b3%e5%8f%b0%e6%88%90%e7%82%ba%e5%8d%94%e4%bd%9c%e5%ae%89%e5%85%a8%e9%a0%98%e5%9f%9f%e9%a0%98%e5%b0%8e%e5%93%81%e7%89%8c%e7%9a%84-4-%e5%80%8b%e5%8e%9f%e5%9b%a0\/","title":{"rendered":"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0"},"content":{"rendered":"<p>Techvision Research <a href=\"https:\/\/www.nojitter.com\/ucaas\/evaluating-cisco-microsoft-zoom-ucaas-security\">\u6700\u8fd1\u8a55\u6bd4<\/a>\u5404\u5927\u96f2\u7aef\u5354\u4f5c\u5e73\u53f0\u7684\u5b89\u5168\u548c\u96b1\u79c1\u9632\u8b77\u8868\u73fe\uff0c\u6307\u51fa Webex \u7121\u5eb8\u7f6e\u7591\u662f\u6700\u4f73\u9996\u9078\u3002\u8a72\u5831\u544a\u8b49\u5be6<a href=\"https:\/\/blog.webex.com\/zh-hant\/%e8%a6%96%e8%a8%8a%e6%9c%83%e8%ad%b0\/webex-%e5%9c%a8-nsa-%e5%8d%94%e4%bd%9c%e6%9c%8d%e5%8b%99%e6%8c%87%e5%8d%97%e4%b8%ad%e8%a2%ab%e5%88%97%e7%82%ba%e6%9c%80%e4%bd%b3\/\">\u7f8e\u570b\u570b\u5bb6\u5b89\u5168\u5c40<\/a>\u548c\u5176\u4ed6\u6a5f\u69cb\u6240\u78ba\u8a8d\u7684\u7d50\u8ad6\uff0c\u4ea6\u5373 Webex \u63d0\u4f9b\u6700\u5b8c\u6574\u7684\u5b89\u5168\u548c\u96b1\u79c1\u9632\u8b77\u5de5\u5177\u7d44\uff0c\u80fd\u5354\u52a9\u7d44\u7e54\u964d\u4f4e\u6574\u500b\u5354\u4f5c\u751f\u614b\u7cfb\u7d71\u7684\u98a8\u96aa\u3002<\/p>\n<p>\u4eca\u5929\u662f\u570b\u969b\u8cc7\u6599\u96b1\u79c1\u65e5\uff0c\u6211\u5011\u5c07\u63a2\u7d22 Webex \u4fdd\u8b77\u4f7f\u7528\u8005\u3001\u5167\u5bb9\u3001\u61c9\u7528\u7a0b\u5f0f\u548c\u88dd\u7f6e\u7684 4 \u7a2e\u65b9\u5f0f\uff0c\u4e26\u77ad\u89e3\u5c0d\u5168\u7403\u6ce8\u91cd\u8cc7\u5b89\u7684\u516c\u53f8\u800c\u8a00\uff0cWebex \u70ba\u4f55\u6703\u662f\u6700\u4f73\u9996\u9078\u3002<\/p>\n<h2><strong>#1 \u900f\u904e\u7aef\u5c0d\u7aef\u52a0\u5bc6\u78ba\u4fdd\u6703\u8b70\u5167\u5bb9\u6975\u5ea6\u5b89\u5168\u7121\u865e<\/strong><\/h2>\n<p>\u904e\u53bb\u5e7e\u5e74\u7684\u5927\u74b0\u5883\u4fc3\u4f7f\u96f2\u7aef\u5354\u4f5c\u52a0\u901f\u666e\u53ca\uff0c\u9032\u800c\u8b93\u7d44\u7e54\u5f97\u4ee5\u5206\u6563\u4eba\u529b\u914d\u7f6e\uff0c\u4f46\u540c\u6642\uff0c\u7d44\u7e54\u5c0d\u65bc\u7db2\u8def\u5b89\u5168\u7684\u7591\u616e\u4e5f\u96a8\u4e4b\u589e\u52a0\u3002\u70ba\u4e86\u964d\u4f4e\u6709\u5fc3\u4eba\u58eb\u60e1\u610f\u6514\u622a\u8cc7\u6599\u7684\u98a8\u96aa\uff0cWebex \u904b\u7528\u5404\u7a2e\u5b89\u5168\u67b6\u69cb\uff08\u5305\u62ec<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collaboration\/webex-security.html\">\u7aef\u5c0d\u7aef\u52a0\u5bc6<\/a>\uff09\u4fdd\u8b77\u8cc7\u6599\uff0c\u4f7f\u8cc7\u6599\u7121\u8ad6\u5728\u50b3\u8f38\u904e\u7a0b\u4e2d\u9084\u662f\u5b58\u653e\u65bc\u96f2\u7aef\u671f\u9593\uff0c\u90fd\u80fd\u5b89\u5168\u7121\u865e\u3002<\/p>\n<p>\u81ea 2011 \u5e74\u4ee5\u4f86\uff0cWebex \u4fbf\u5728 Webex Meetings \u61c9\u7528\u7a0b\u5f0f\u4e2d\u6301\u7e8c\u652f\u63f4\u7aef\u5c0d\u7aef\u52a0\u5bc6\u6280\u8853\u30022021 \u5e74\uff0c\u6211\u5011\u5c07 Webex Meetings \u5347\u7d1a\uff0c\u6539\u70ba\u63a1\u53d6\u96f6\u4fe1\u4efb\u5b89\u5168\u9632\u8b77\u7b56\u7565\uff0c\u9019\u7a2e\u4ee5\u5404\u9805\u6a19\u6e96\u70ba\u4f9d\u64da\u7684\u901a\u8a0a\u5354\u5b9a\u80fd\u6709\u6548\u9a57\u8b49\u8eab\u5206\uff0c\u9054\u5230\u7aef\u5c0d\u7aef\u52a0\u5bc6\u7684\u76ee\u7684\uff0c\u4e26\u4e14\u9032\u4e00\u6b65\u652f\u63f4 Webex \u88dd\u7f6e\u3002\u4e5f\u5c31\u662f\u8aaa\uff0c\u6211\u5011\u627f\u8afe\u7684\u5b89\u5168\u4e26\u975e\u53ea\u662f\u6211\u5011\u55ae\u65b9\u9762\u7684\u8aaa\u8a5e\uff0c\u4e8b\u5be6\u4e0a\uff0c\u6211\u5011\u7684\u52a0\u5bc6\u6280\u8853\u7d93\u904e\u696d\u754c\u9818\u5c0e\u5ee0\u5546\u548c\u5b78\u8853\u5c08\u5bb6\u7684\u6b63\u5f0f\u6aa2\u9a57\uff0c\u60a8\u5927\u53ef\u5b89\u5fc3\u63a1\u7528\u3002<\/p>\n<p>\u6b64\u5916\uff0cWebex \u4e5f\u80fd\u70ba\u60a8\u5b58\u653e\u5728 Webex \u96f2\u7aef\u7684\u5167\u5bb9\u63d0\u4f9b\u5f48\u6027\u7684\u52a0\u5bc6\u548c\u91d1\u9470\u7ba1\u7406\u9078\u9805\u3002\u6211\u5011\u63d0\u4f9b\u5167\u90e8\u90e8\u7f72\u91d1\u9470\u7ba1\u7406\uff08\u4e5f\u7a31\u70ba\u6df7\u5408\u8cc7\u6599\u5b89\u5168 (HDS)\uff09\uff0c\u53e6\u5916\u4eca\u5e74\u6625\u5b63\u5373\u5c07\u63a8\u51fa\u7684\u96f2\u7aef\u529f\u80fd\u4e5f\u5305\u542b\u81ea\u5e36\u91d1\u9470 (BYOK) \u7684\u9078\u9805\u3002\u7121\u8ad6\u662f\u63a1\u53d6 BYOK \u6216 HDS\uff0c\u60a8\u90fd\u80fd\u5c0d\u5b58\u653e\u7684\u8cc7\u6599\u4fdd\u6709\u5b8c\u6574\u63a7\u5236\u6b0a\uff0c\u9664\u975e\u60a8\u660e\u78ba\u6388\u6b0a\u7d66\u4ed6\u4eba\uff0c\u5426\u5247\u4efb\u4f55\u4eba\u90fd\u7121\u6cd5\u5b58\u53d6\u60a8\u7684\u8cc7\u6599\u3002\u60a8\u7684\u5167\u5bb9\u96a8\u6642\u90fd\u80fd\u7dad\u6301\u65bc\u4fdd\u5bc6\u72c0\u614b\uff0c\u7d55\u5c0d\u4e0d\u6703\u5916\u6d41\u3002<\/p>\n<p><iframe loading=\"lazy\" title=\"End to end encryption | Webex Security\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/tjPxWYn0rF8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h2><strong>#2 \u78ba\u4fdd\u8cc7\u6599\u96b1\u79c1\u4e26\u7b26\u5408\u6cd5\u5f8b\u898f\u7bc4\uff0c\u4e0d\u53d7\u7d44\u7e54\u7684\u4f4d\u7f6e\u6240\u9650\u5236<\/strong><\/h2>\n<p>\u96a8\u8457\u96f2\u7aef\u65e5\u76ca\u666e\u53ca\uff0c\u8cc7\u6599\u96b1\u79c1\u8d8a\u4f86\u8d8a\u53d7\u5230\u91cd\u8996\u3002\u8cc7\u5b89\u5b98\u54e1\u9700\u8981\u78ba\u4fdd\u5404\u7a2e\u8cc7\u6599\uff08\u5305\u62ec\u500b\u4eba\u8eab\u5206\u8b58\u5225\u8cc7\u8a0a (PII)\uff09\u90fd\u80fd\u7372\u5f97\u59a5\u5584\u4fdd\u8b77\uff0c\u800c\u653f\u5e9c\u4e5f\u5df2\u8457\u624b\u5b9a\u7fa9\u9069\u7576\u7684\u8cc7\u8a0a\u5b58\u653e\u4f4d\u7f6e\u3001\u7ba1\u7406\u65b9\u5f0f\uff0c\u4ee5\u53ca\u64c1\u6709\u5b58\u53d6\u6b0a\u9650\u7684\u4eba\u54e1\u3002\u5728\u8cc7\u6599\u7ba1\u7406\u65b9\u9762\uff0cWebex <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/trust-center.html\">\u627f\u8afe\u63d0\u4f9b\u503c\u5f97\u4fe1\u8cf4\u7684\u900f\u660e\u670d\u52d9\uff0c\u800c\u4e14\u9858\u610f\u8ca0\u8d77\u61c9\u6709\u7684\u8cac\u4efb<\/a>\uff1b\u5728\u6211\u5011\u7684\u5354\u52a9\u4e0b\uff0c\u60a8\u80fd\u8f15\u9b06\u7b26\u5408\u8cc7\u6599\u7ba1\u7406\u6cd5\u898f\u7684\u76f8\u95dc\u898f\u7bc4\u3002\u6191\u85c9\u904d\u4f48\u5168\u7403\u7684 44 \u5ea7 Webex \u8cc7\u6599\u4e2d\u5fc3\u548c\u6578\u5341\u9805\u8a8d\u8b49\uff0c\u7121\u8ad6\u60a8\u8eab\u5728\u4f55\u8655\uff0c\u6211\u5011\u90fd\u80fd\u5354\u52a9\u60a8\u5b88\u8b77\u8cc7\u6599\u96b1\u79c1\uff0c\u4e26\u7b26\u5408\u6240\u5728\u5730\u5340\u548c\u5340\u57df\u7684\u898f\u5247\u548c\u898f\u7bc4\u3002<\/p>\n<p class=\"p1\">\u6211\u5011\u9075\u5faa\u300a\u4e00\u822c\u8cc7\u6599\u4fdd\u8b77\u898f\u7bc4\u300b(GDPR)\uff0c<a href=\"https:\/\/blog.webex.com\/zh-hant\/customer-stories\/%e6%ad%a1%e6%85%b6-webex-%e5%ae%a2%e6%88%b6%e5%9c%a8%e5%85%a8%e9%9d%a2%e5%af%a6%e7%8f%be%e6%ad%90%e7%9b%9f%e8%b3%87%e6%96%99%e8%90%bd%e5%9c%b0%e8%a6%81%e6%b1%82%e4%b8%8a%e5%8f%96%e5%be%97%e9%87%8d\/#:%7E:text=Webex%20was%20declared%20adherent%20to,privacy%2C%20transparency%2C%20and%20accountability.\"><span class=\"s1\">\u81f4\u529b\u65bc\u7b26\u5408\u6b50\u76df\u8cc7\u6599\u843d\u5730\u8981\u6c42<\/span><\/a>\uff0c\u6b64\u5916\u4e5f\u53d6\u5f97\u6b50\u76df\u8cc7\u6599\u4fdd\u8b77\u76e3\u7ba1\u6a5f\u95dc (EDPS) \u7684\u81e8\u6642\u6838\u51c6\uff0c\u53ef\u4f9b\u653f\u5e9c\u5ba2\u6236\u5b89\u5fc3\u4f7f\u7528\uff08\u5982\u9700\u77ad\u89e3 EDPS \u6838\u51c6\u8cc7\u8a0a\uff0c\u8acb\u53c3\u95b1<a href=\"https:\/\/edps.europa.eu\/system\/files\/2021-11\/17-11-2021-edps_decision_authorising_temorarily_use_of_cjeu-cisco_ad_hoc_clauses_for_transfers_cisco_webex_1.pdf\"><span class=\"s1\">\u6b64\u8655<\/span><\/a>\uff09\u3002\u6211\u5011\u7684 <a href=\"https:\/\/www.webex.com\/industries\/government.html\">Webex for Government<\/a> \u89e3\u6c7a\u65b9\u6848\u7372\u5f97 FedRAMP \u6388\u6b0a\uff0c\u53ef\u4f9b\u7f8e\u570b\u806f\u90a6\u653f\u5e9c\u6a5f\u95dc\u4f7f\u7528\uff0c\u800c\u6211\u5011\u7684 <a href=\"https:\/\/www.webex.com\/industries\/government\/defense.html\">Webex for Defense<\/a> \u89e3\u6c7a\u65b9\u6848\u4e5f\u5df2\u53d6\u5f97 DISA IL5 \u6388\u6b0a\u3002\u81f3\u65bc\u5340\u57df\u6027\u8cea\u7684\u8b49\u660e\u548c\u8a8d\u8b49\uff0c\u6211\u5011\u4e00\u5411\u90fd\u80fd\u63d0\u524d\u514c\u73fe\u6240\u63d0\u51fa\u7684\u627f\u8afe\uff0c\u4f8b\u5982\u6211\u5011\u5df2\u53d6\u5f97\u897f\u73ed\u7259 ENS \u548c\u65e5\u672c ISMAP \u8a8d\u8b49\uff0c\u6eff\u8db3\u9019\u4e9b\u5730\u5340\u7684\u4f7f\u7528\u8005\u9700\u6c42\u3002<\/p>\n<p>\u4eca\u5e74\u6625\u5b63\uff0cWebex \u5373\u5c07\u65bc\u52a0\u62ff\u5927\u591a\u502b\u591a\u548c\u8499\u7279\u5a41\u9019\u5169\u500b\u57ce\u5e02\u64f4\u5c55 Webex \u670d\u52d9\uff0c\u540c\u6642\u652f\u63f4\u516c\u79c1\u90e8\u9580\u7d44\u7e54\uff0c\u91dd\u5c0d\u61c9\u7528\u7a0b\u5f0f\u548c\u5ba2\u6236\u8cc7\u6599\u63d0\u4f9b\u570b\u5167\u8cc7\u6599\u843d\u5730\u3001\u5bb9\u932f\u79fb\u8f49\u548c\u707d\u96e3\u5fa9\u539f\u670d\u52d9\u3002\u5982\u679c\u5ba2\u6236\u5c0d\u65bc\u8cc7\u6599\u5b58\u653e\u7684\u4f4d\u7f6e\u6709\u6240\u8981\u6c42\uff08\u4f8b\u5982\u516c\u90e8\u9580\u6216\u91ab\u7642\u4fdd\u5065\u9818\u57df\u7684\u5ba2\u6236\uff09\uff0c\u9019\u4e9b\u65b0\u589e\u670d\u52d9\u52e2\u5fc5\u80fd\u70ba\u5176\u63d0\u4f9b\u83ab\u5927\u5e6b\u52a9\u3002<\/p>\n<h2><strong>#3 \u4ee5\u5167\u5efa\u5b89\u5168\u63a7\u7ba1\u6a5f\u5236\u548c DLP \u6253\u9020\u6ef4\u6c34\u4e0d\u6f0f\u7684\u5f37\u5927\u9632\u8b77\uff0c\u56b4\u9632\u8cc7\u6599\u5916\u6d29<\/strong><\/h2>\n<p>\u4e00\u63d0\u53ca\u8cc7\u6599\u5916\u6d29\uff0c\u6211\u5011\u7d93\u5e38\u6703\u806f\u60f3\u5230\u516c\u53f8\u8cc7\u6599\u5eab\u906d\u99ed\u5ba2\u60e1\u610f\u5165\u4fb5\u3002\u7136\u800c\uff0c\u7d44\u7e54\u5167\u90e8\u4eba\u54e1\u4e0d\u614e\u6216\u523b\u610f\u6d29\u6f0f\u6a5f\u5bc6\u8cc7\u8a0a\uff08\u4f8b\u5982\u9280\u884c\u5e33\u6236\u8cc7\u8a0a\u6216\u8eab\u5206\u8b49\u5b57\u865f\uff09\uff0c\u5c0e\u81f4\u975e\u9810\u671f\u63a5\u6536\u8005\u6709\u6a5f\u53ef\u8d81\uff0c\u9019\u985e\u5a01\u8105\u5176\u5be6\u66f4\u6709\u53ef\u80fd\u767c\u751f\u3002\u6709\u9451\u65bc\u6b64\uff0cWebex \u5141\u8a31 IT \u7ba1\u7406\u54e1\u5236\u5b9a\u7cbe\u7d30\u7684\u5b89\u5168\u6027\u8207\u6cd5\u898f\u9075\u5faa\u653f\u7b56\uff0c\u7981\u6b62\u5167\u90e8\u4eba\u54e1\u8207\u7d44\u7e54\u4ee5\u5916\u7684\u4eba\u58eb\u5171\u7528\u7279\u5b9a\u6a94\u6848\u548c\u8cc7\u8a0a\uff0c\u6216\u7981\u6b62\u8cc7\u6599\u5728\u6a5f\u69cb\u5167\u90e8\u7684\u7fa4\u7d44\u4e4b\u9593\u5171\u7528\u3002\u60a8\u53ef\u4ee5\u5728\u90e8\u9580\u548c\u516c\u53f8\u5c64\u7d1a\u8a2d\u5b9a\u63a7\u7ba1\u6a5f\u5236\uff0c\u4e26\u76e3\u63a7\u7d44\u7e54\u5167\u90e8\u662f\u5426\u51fa\u73fe\u9055\u898f\u884c\u70ba\u3002<\/p>\n<p>\u5982\u679c\u60a8\u8981\u9032\u4e00\u6b65\u638c\u63e1\u53ca\u63a7\u7ba1\u6a5f\u5bc6\u8cc7\u6599\uff0cWebex \u9084\u63d0\u4f9b\u9032\u968e\u7684\u8cc7\u6599\u907a\u5931\u9632\u7bc4 (DLP) \u529f\u80fd\uff0c\u8b93\u60a8\u7684\u54e1\u5de5\u5728\u8207\u5167\u90e8\u548c\u5916\u90e8\u4eba\u54e1\u5354\u4f5c\u6642\uff0c\u90fd\u80fd\u96a8\u6642\u53d7\u5230\u653f\u7b56\u898f\u7bc4\u3002\u82e5\u8981\u5b58\u53d6\u9032\u968e DLP\uff0cWebex \u5ba2\u6236\u53ef\u4ee5\u4f7f\u7528\u6211\u5011\u7684\u4e8b\u4ef6 API\uff0c\u6574\u5408 Cisco Cloudlock \u6216\u60a8\u76ee\u524d\u5408\u4f5c\u7684 <a href=\"https:\/\/help.webex.com\/en-US\/article\/nmbm0jk\/Webex-Integration-with-Archiving-and-Data-Loss-Prevention-Solutions\">DLP \u5ee0\u5546<\/a>\u3002\u60a8\u53ef\u4ee5\u4f7f\u7528\u8fd1\u4e4e\u5373\u6642\u7684 DLP \u4fdd\u8b77\u6703\u8b70\u548c\u50b3\u8a0a\u8cc7\u6599\uff0c\u4e26\u53ef\u9078\u64c7\u4fee\u8a02\u6216\u522a\u9664\u7121\u610f\u900f\u9732\u7684\u8a0a\u606f\u3001\u6a94\u6848\u3001\u8f49\u9304\u6587\u5b57\u548c\u9304\u88fd\u5167\u5bb9\uff0c\u8981\u662f\u4e00\u65e6\u767c\u751f\u4efb\u4f55\u9055\u898f\u4e8b\u4ef6\uff0c\u60a8\u4e5f\u80fd\u901a\u77e5\u4f7f\u7528\u8005\u6216\u7ba1\u7406\u54e1\u3002\u6216\u8005\uff0c\u60a8\u53ef\u4ee5\u5229\u7528<a href=\"https:\/\/blog.webex.com\/zh-hant\/%e8%a6%96%e8%a8%8a%e6%9c%83%e8%ad%b0\/%e5%8d%94%e4%bd%9c%e4%b8%8d%e5%bf%85%e5%a6%a5%e5%8d%94%ef%bc%9a%e9%81%a9%e7%94%a8%e6%96%bc-webex-%e8%a8%8a%e6%81%af%e5%92%8c%e6%aa%94%e6%a1%88%e7%9a%84%e5%8d%b3%e6%99%82%e8%b3%87%e6%96%99%e9%81%ba\/\">\u5373\u6642 DLP<\/a> \u50b3\u9001\u8a0a\u606f\uff0c\u5728\u4ed6\u4eba\u63a5\u6536\u6a94\u6848\u524d\u5148\u884c\u6383\u63cf\u6a94\u6848\u5167\u5bb9\uff0c\u4e26\u8996\u60c5\u6cc1\u4e88\u4ee5\u522a\u9664\u3002<\/p>\n<h2><strong>#4 \u4ee5\u5168\u7403\u9996\u5c48\u4e00\u6307\u7684\u7db2\u8def\u5b89\u5168\u516c\u53f8\u70ba\u5f8c\u76fe\uff0c\u5be6\u73fe\u4f01\u696d\u7d1a\u8cc7\u5b89<\/strong><\/h2>\n<p>\u601d\u79d1\u662f\u5168\u7403\u6700\u5927\u7684\u7db2\u8def\u5b89\u5168\u516c\u53f8\u3002Webex \u96b8\u5c6c\u65bc\u601d\u79d1\u65d7\u4e0b\uff0c\u6b63\u662f\u63a1\u7528<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/trust-center.html\">\u601d\u79d1\u8cc7\u5b89\u6280\u8853\u548c\u4fe1\u4efb\u7d44\u7e54<\/a> \u4f86\u7ba1\u7406\u8cc7\u8a0a\u5b89\u5168\u3002\u6211\u5011\u5229\u7528\u7a81\u7834\u6027\u7684\u5275\u65b0\u6a5f\u5236\u548c\u65b9\u6cd5\uff0c\u958b\u767c\u4e16\u754c\u7d1a\u7684\u5167\u5efa\u5f0f\u5354\u4f5c\u89e3\u6c7a\u65b9\u6848\uff0c\u70ba\u4f7f\u7528\u8005\u63d0\u4f9b\u9806\u66a2\u7684\u4f7f\u7528\u9ad4\u9a57\uff0c\u4e26\u4fdd\u8b77\u4f7f\u7528\u8005\u7684\u5167\u5bb9\u3002\u8209\u51e1\u9a57\u8b49\u8eab\u5206\u8b58\u5225\u3001\u91dd\u5c0d\u500b\u4eba\u7ba1\u7406\u7684\u88dd\u7f6e\u63d0\u4f9b\u4e0a\u7dda\u548c\u96e2\u7dda\u653f\u7b56\u652f\u63f4\u3001\u843d\u5be6\u5927\u5ef3\u63a7\u7ba1\uff0c\u4ee5\u53ca\u63d0\u4f9b\u8cc7\u5b89\u8996\u89ba\u6a19\u793a\uff08\u4f8b\u5982\u63d0\u4f9b\u7d66\u5916\u90e8\u4f7f\u7528\u8005\u7684\u52a0\u5bc6\u8b58\u5225\u8b49\uff09\uff0c\u5373\u70ba\u90e8\u5206\u5be6\u4f8b\u3002<\/p>\n<p>\u900f\u904e\u4e0a\u8ff0\u6a5f\u5236\u53ca\u5176\u4ed6\u65b9\u6cd5\uff0c\u6211\u5011\u53ef\u5354\u52a9\u5ba2\u6236\u63d0\u4f9b\u8de8\u61c9\u7528\u7a0b\u5f0f\u548c\u88dd\u7f6e\u7684\u52d5\u614b\u5354\u4f5c\u9ad4\u9a57\uff0c\u9664\u4e86\u7d66\u4e88\u4f7f\u7528\u8005\u66f4\u591a\u5f37\u5927\u529f\u80fd\uff0c\u4e5f\u6df1\u5316\u5f7c\u6b64\u4fe1\u8cf4\u7684\u5408\u4f5c\u95dc\u4fc2\u3002\u5728\u601d\u79d1\u7684\u652f\u63f4\u4e0b\uff0cWebex \u5e73\u53f0\u4f7f\u7528\u9818\u5148\u696d\u754c\u7684\u5b89\u5168\u3001\u96b1\u79c1\u548c\u5408\u898f\u529f\u80fd\uff0c\u52a0\u901f\u5be6\u73fe\u6df7\u5408\u5f0f\u5de5\u4f5c\u578b\u614b\u3002<\/p>\n<blockquote><p>\u60f3\u6df1\u5165\u77ad\u89e3\u5354\u4f5c\u7684\u5b89\u5168\u72c0\u614b\uff0c\u4ee5\u53ca\u8cb4\u7d44\u7e54\u80fd\u5982\u4f55\u4f7f\u7528 Webex \u78ba\u4fdd\u5b89\u5168\u3001\u634d\u885b\u96b1\u79c1\u53ca\u9075\u5faa\u6cd5\u898f\u55ce\uff1f\u6b61\u8fce\u900f\u904e WebexOne \u89c0\u770b\u6211\u5011\u7684<a href=\"https:\/\/www.youtube.com\/watch?v=p_J_Gwb1m1E\">\u8cc7\u5b89\u5713\u684c\u6703\u8b70<\/a>\u3002<\/p><\/blockquote>\n<p><strong>\u6df1\u5165\u77ad\u89e3<\/strong><\/p>\n<p><a href=\"https:\/\/blog.webex.com\/zh-hant\/%e8%a6%96%e8%a8%8a%e6%9c%83%e8%ad%b0\/%e7%b6%b2%e8%b7%af%e5%ae%89%e5%85%a8-%ef%bc%88nsa%ef%bc%89-%e5%8d%94%e4%bd%9c%e6%8c%87%e5%8d%97%ef%bc%9a-%e5%ae%89%e5%85%a8%e5%ae%89%e5%85%a8%e6%80%a7%e8%88%87%e5%90%88%e8%a6%8f%e6%80%a7%e7%9a%84-5\/\">\u7f8e\u570b\u570b\u5bb6\u5b89\u5168\u5c40 (NSA) \u5354\u4f5c\u6307\u5357\uff1a\u843d\u5be6\u8cc7\u5b89\u8207\u6cd5\u898f\u9075\u5faa\u7684 5 \u500b\u91cd\u8981\u554f\u984c<\/a><\/p>\n<p><a href=\"https:\/\/blog.webex.com\/zh-hant\/%e8%a6%96%e8%a8%8a%e6%9c%83%e8%ad%b0\/webex%ef%bc%9a-%e8%a8%ad%e5%ae%9a%e6%96%b0%e5%b7%a5%e5%85%b7%e7%9a%84%e5%ae%89%e5%85%a8%e6%80%a7%e5%92%8c%e5%90%88%e8%a6%8f%e6%80%a7%e6%a8%99%e6%ba%96%e4%bb%a5%e4%bf%9d%e6%8c%81%e6%9c%83%e8%ad%b0\/\">Webex\uff1a\u4f7f\u7528\u65b0\u5de5\u5177\u8a2d\u5b9a\u8cc7\u5b89\u548c\u6cd5\u898f\u9075\u5faa\u6a19\u6e96\uff0c\u78ba\u4fdd\u6703\u8b70\u548c\u5167\u5bb9\u5b89\u5168\u7121\u865e<\/a><\/p>\n<p><a href=\"https:\/\/blog.webex.com\/zh-hant\/%e8%a6%96%e8%a8%8a%e6%9c%83%e8%ad%b0\/webex-%e6%9c%80%e6%96%b0%e6%b6%88%e6%81%af%ef%bc%9a2022-%e5%b9%b4-1-%e6%9c%88\/\">Webex \u6700\u65b0\u6d88\u606f\uff1a2021 \u5e74 1 \u6708<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Techvision Research  [&hellip;]<\/p>\n","protected":false},"author":5569,"featured_media":384621,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[8011,1574],"tags":[8211,8508,3133,15112,8307,12062,12151,12152,12149,4584],"class_list":["post-389313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-8011","category-1574","tag-cisco-cloudlock-zh-hant","tag-webex-meetings-zh-hant-2","tag-webex-","tag-workforce-management","tag-8307","tag-12062","tag-12151","tag-12152","tag-12149","tag-4584"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0 | Webex Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0 | Webex Blog\" \/>\n<meta property=\"og:description\" content=\"Techvision Research [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Webex Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-28T16:11:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"975\" \/>\n\t<meta property=\"og:image:height\" content=\"545\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tracy Toth\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tracy Toth\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\"},\"author\":{\"name\":\"Tracy Toth\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/ee94c7dd7ec58140b09cc3c22ce0d510\"},\"headline\":\"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0\",\"datePublished\":\"2022-01-28T16:11:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\"},\"wordCount\":67,\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg\",\"keywords\":[\"Cisco Cloudlock\",\"Webex Meetings\",\"Webex \u88dd\u7f6e\",\"Workforce Management\",\"\u5354\u4f5c\u89e3\u6c7a\u65b9\u6848\",\"\u5de5\u4f5c\u529b\u7ba1\u7406\",\"\u8cc7\u6599\u4e2d\u5fc3\",\"\u8cc7\u6599\u5e38\u99d0\",\"\u8cc7\u6599\u640d\u5931\u9810\u9632\",\"\u96f2\u7aef\u901a\u8a0a\"],\"articleSection\":[\"\u5354\u540c\u5408\u4f5c\",\"\u6df7\u5408\u8fa6\u516c\"],\"inLanguage\":\"zh-TW\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\",\"url\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\",\"name\":\"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0 | Webex Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg\",\"datePublished\":\"2022-01-28T16:11:30+00:00\",\"author\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/ee94c7dd7ec58140b09cc3c22ce0d510\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage\",\"url\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg\",\"contentUrl\":\"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg\",\"width\":975,\"height\":545,\"caption\":\"Webex security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.webex.com\/zh-hant\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.webex.com\/es\/#website\",\"url\":\"https:\/\/blog.webex.com\/es\/\",\"name\":\"Webex Blog\",\"description\":\"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.webex.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/ee94c7dd7ec58140b09cc3c22ce0d510\",\"name\":\"Tracy Toth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f28f89dc477331ff2fa80400132fdfdd6c800097ff2f05ff8b1974f0148e9075?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f28f89dc477331ff2fa80400132fdfdd6c800097ff2f05ff8b1974f0148e9075?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Tracy Toth\"},\"description\":\"Tracy Toth leads product marketing for the Webex platform \u2013 the leading platform accelerating what\u2019s possible in hybrid work by delivering dynamic collaboration experiences across applications and devices that empower users and foster trust. She works with a team committed to sharing the power of the platform with users, IT buyers, IT administrators and technology partners around the world, touting the benefits of its: - Enterprise-grade security, privacy and compliance that delivers 360-degree protection - Simple administration through 1 powerful tool with the most advanced insights available - Extensible architecture with open APIs, integrations and advanced interoperability, and - Industry-leading AI features that empower users to easily work from anywhere, with anyone Prior to joining Webex, Tracy worked as a marketing strategist, helping tech startups, global IT services and technology organizations, and online marketplaces create compelling, brand-relevant stories, connect with their audiences, strengthen their brands and enable Sales and Marketing to reach their targets. Previously she helped to grow the U.S.\u2019s first SaaS payroll company and developed product marketing capabilities for cloud hosting, security and IT management services for a multi-national business based in Australia. As a mother who would rather spend time with her family than commute, Tracy loves Webex and is passionate about its ability to allow people the opportunity to do what they love while working from anywhere.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/smallbizmarketing\/\"],\"url\":\"https:\/\/blog.webex.com\/zh-hant\/contributors\/t_toth\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0 | Webex Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/","og_locale":"zh_TW","og_type":"article","og_title":"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0 | Webex Blog","og_description":"Techvision Research [&hellip;]","og_url":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/","og_site_name":"Webex Blog","article_published_time":"2022-01-28T16:11:30+00:00","og_image":[{"width":975,"height":545,"url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg","type":"image\/jpeg"}],"author":"Tracy Toth","twitter_misc":{"\u4f5c\u8005:":"Tracy Toth"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#article","isPartOf":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/"},"author":{"name":"Tracy Toth","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/ee94c7dd7ec58140b09cc3c22ce0d510"},"headline":"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0","datePublished":"2022-01-28T16:11:30+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/"},"wordCount":67,"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg","keywords":["Cisco Cloudlock","Webex Meetings","Webex \u88dd\u7f6e","Workforce Management","\u5354\u4f5c\u89e3\u6c7a\u65b9\u6848","\u5de5\u4f5c\u529b\u7ba1\u7406","\u8cc7\u6599\u4e2d\u5fc3","\u8cc7\u6599\u5e38\u99d0","\u8cc7\u6599\u640d\u5931\u9810\u9632","\u96f2\u7aef\u901a\u8a0a"],"articleSection":["\u5354\u540c\u5408\u4f5c","\u6df7\u5408\u8fa6\u516c"],"inLanguage":"zh-TW"},{"@type":"WebPage","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/","url":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/","name":"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0 | Webex Blog","isPartOf":{"@id":"https:\/\/blog.webex.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg","datePublished":"2022-01-28T16:11:30+00:00","author":{"@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/ee94c7dd7ec58140b09cc3c22ce0d510"},"breadcrumb":{"@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#primaryimage","url":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg","contentUrl":"https:\/\/blog.webex.com\/wp-content\/uploads\/2022\/01\/CM-4018-Webex-security-975x544-1.jpg","width":975,"height":545,"caption":"Webex security"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.webex.com\/collaboration\/hybrid-work\/4-reasons-the-webex-platform-leads-collaboration-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.webex.com\/zh-hant\/"},{"@type":"ListItem","position":2,"name":"Webex \u5e73\u53f0\u6210\u70ba\u5354\u4f5c\u5b89\u5168\u9818\u57df\u9818\u5c0e\u54c1\u724c\u7684 4 \u500b\u539f\u56e0"}]},{"@type":"WebSite","@id":"https:\/\/blog.webex.com\/es\/#website","url":"https:\/\/blog.webex.com\/es\/","name":"Webex Blog","description":"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.webex.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Person","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/ee94c7dd7ec58140b09cc3c22ce0d510","name":"Tracy Toth","image":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f28f89dc477331ff2fa80400132fdfdd6c800097ff2f05ff8b1974f0148e9075?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f28f89dc477331ff2fa80400132fdfdd6c800097ff2f05ff8b1974f0148e9075?s=96&d=wp_user_avatar&r=g","caption":"Tracy Toth"},"description":"Tracy Toth leads product marketing for the Webex platform \u2013 the leading platform accelerating what\u2019s possible in hybrid work by delivering dynamic collaboration experiences across applications and devices that empower users and foster trust. She works with a team committed to sharing the power of the platform with users, IT buyers, IT administrators and technology partners around the world, touting the benefits of its: - Enterprise-grade security, privacy and compliance that delivers 360-degree protection - Simple administration through 1 powerful tool with the most advanced insights available - Extensible architecture with open APIs, integrations and advanced interoperability, and - Industry-leading AI features that empower users to easily work from anywhere, with anyone Prior to joining Webex, Tracy worked as a marketing strategist, helping tech startups, global IT services and technology organizations, and online marketplaces create compelling, brand-relevant stories, connect with their audiences, strengthen their brands and enable Sales and Marketing to reach their targets. Previously she helped to grow the U.S.\u2019s first SaaS payroll company and developed product marketing capabilities for cloud hosting, security and IT management services for a multi-national business based in Australia. As a mother who would rather spend time with her family than commute, Tracy loves Webex and is passionate about its ability to allow people the opportunity to do what they love while working from anywhere.","sameAs":["https:\/\/www.linkedin.com\/in\/smallbizmarketing\/"],"url":"https:\/\/blog.webex.com\/zh-hant\/contributors\/t_toth\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/posts\/389313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/users\/5569"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=389313"}],"version-history":[{"count":0,"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/posts\/389313\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/media\/384621"}],"wp:attachment":[{"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=389313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/categories?post=389313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webex.com\/zh-hant\/wp-json\/wp\/v2\/tags?post=389313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}