{"id":4,"date":"2018-04-03T13:27:13","date_gmt":"2018-04-03T05:27:13","guid":{"rendered":"http:\/\/47.52.67.1:8085\/wordpress\/?page_id=4"},"modified":"2025-01-21T14:48:14","modified_gmt":"2025-01-21T06:48:14","slug":"contact-center-voice-video-recording","status":"publish","type":"page","link":"https:\/\/www.voicecyber.com\/index.php\/contact-center-wfo-products\/contact-center-voice-video-recording\/","title":{"rendered":"Contact Center Voice and Video Recording &#8211; VCLog"},"content":{"rendered":"<table style=\"height: 452px; width: 99.9193%;\">\n<tbody>\n<tr style=\"height: 443px;\">\n<td style=\"width: 607.153px; height: 443px;\">\n<h3><strong>Record Every Voice, Every Interaction<br><\/strong><\/h3>\n<p><strong>Record every conversation. <\/strong><span style=\"color: #808080;\">VCLog records complete and secured voice conversation for every interaction and allow user repeatable playback recording files. VCLog able to ensure a 100% of voice capturing and forward the recorded recordings to ASR engine while complying the contact center business security regulations so that no recording is lost. VCLog provides quick search feature for the wanted recording file through key call information or other related business information from thousands of recording files. This product provides evidence for every dispute, provides solution for potential business risk, provides channel to listen to customer for their needs, and provides guarantee for contact center to hit KPI. <\/span><\/p>\n<\/td>\n<td style=\"width: 460.486px; height: 443px;\"><img loading=\"lazy\" class=\"wp-image-2957 alignright\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN.png\" alt=\"\" width=\"433\" height=\"383\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN.png 4071w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN-300x265.png 300w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN-1024x905.png 1024w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN-768x679.png 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN-1536x1358.png 1536w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/VCLog\u754c\u9762\u56fe-EN-2048x1811.png 2048w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 457px; width: 99.9094%;\">\n<tbody>\n<tr>\n<td style=\"width: 441px;\"><img loading=\"lazy\" class=\"alignnone  wp-image-2428\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/4-1-768x605-1.jpg\" alt=\"\" width=\"344\" height=\"271\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/4-1-768x605-1.jpg 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/4-1-768x605-1-300x236.jpg 300w\" sizes=\"(max-width: 344px) 100vw, 344px\" \/><\/td>\n<td style=\"width: 625px;\">\n<h3><strong>Capture 100% of Conversation<\/strong><\/h3>\n<p><strong>Full time all conversation recording.&nbsp;<\/strong><span style=\"color: #808080;\">Records every customer conversation without missing any customer interaction data. This ensures you to intuitively see the whole process of customer interaction and the whole picture of contact center work.<\/span><\/p>\n<p><strong>Automatic alarm monitoring and data pre-processing technology. <\/strong><span style=\"color: #808080;\">Automatic alarm monitoring reduces downtime and enable customer to discover the device issue in time. This gives device administrator an early warning to solve the device issue. Advanced data pre-processing technology can effectively ensure that the original data is not lost in the process of network data transmission. Furthermore, guarantee the data integrity received by VCLog recording system so as to ensure that no call data is lost, and the sound quality is good.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 437px; width: 99.7665%;\">\n<tbody>\n<tr>\n<td style=\"width: 607.153px;\">\n<h3><strong>Search for the Correct Content<\/strong><\/h3>\n<p><strong>System automatically organizes and categorizes recording files. <\/strong><span style=\"color: #808080;\">By connecting keywords or speech recognition engine, the system can automatically tag and categorize recording files according to the pre-setting on keywords or text logic. The connection with speech recognition engine also enables the system to transcript all voice into text. Moreover, search and playback the correct recording file from thousands of interaction recordings through specific text information.<\/span><\/p>\n<p><strong>Find the needed one. <\/strong><span style=\"color: #808080;\">Through the rich searching features of VCLog, administrator can quickly search for the needed content from thousands of recordings. With the fusion playback of audio, screen and video recording, it helps to disclose the truth of the incident in time.<\/span><\/p>\n<\/td>\n<td style=\"width: 460.486px;\"><img loading=\"lazy\" class=\"wp-image-2426 alignright\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u5f55\u97f3\u6587\u4ef6\u67e5\u8be2-768x516-1.jpg\" alt=\"\" width=\"408\" height=\"274\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u5f55\u97f3\u6587\u4ef6\u67e5\u8be2-768x516-1.jpg 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u5f55\u97f3\u6587\u4ef6\u67e5\u8be2-768x516-1-300x202.jpg 300w\" sizes=\"(max-width: 408px) 100vw, 408px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 772px; width: 100.668%;\">\n<tbody>\n<tr>\n<td style=\"width: 441px;\"><img loading=\"lazy\" class=\"alignnone  wp-image-2427\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u6570\u636e\u5b89\u5168-768x454-1.png\" alt=\"\" width=\"406\" height=\"240\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u6570\u636e\u5b89\u5168-768x454-1.png 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u6570\u636e\u5b89\u5168-768x454-1-300x177.png 300w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/><\/td>\n<td style=\"width: 642px;\">\n<h3><strong>Protect Your Data, Protect Your Interest<\/strong><\/h3>\n<p><strong>Data security. <\/strong><span style=\"color: #808080;\">Sensitive data is encrypted and save into database using AES 128 algorithm. Payment card industry data security standard (PCI-DSS 3.0) is meet and comply the compliance goal of regulatory requirement. Recording file will not contain sensitive information of customer.<\/span><\/p>\n<p><strong>Transmission security. <\/strong><span style=\"color: #808080;\">All communications between client and server are encrypted using mainstream HTTPS and TLS1.2 based encryption methods. SFTP is optional for file uploading and archiving to ensure data security. <\/span><\/p>\n<p><strong>User security. <\/strong><span style=\"color: #808080;\">User hierarchy and user permission is used to restrict the live monitoring and playback of every recording which prevents the intrusion of eavesdropper and ultimately achieve the system security requirement. In addition, Bcrypt algorithm is used to ensure user security incorporating with salt encryption method.<\/span><\/p>\n<p><span style=\"color: #808080;\"><span style=\"color: #333333;\"><strong>File security. <\/strong><\/span>The AES256 encryption algorithm is used to record, compress, encrypt and store each call recording, thus ensuring the security of customer interaction data in all directions.<\/span><\/p>\n<p><strong style=\"font-family: inherit; font-size: inherit;\">File authenticity. <\/strong><span style=\"color: #808080;\">Inserting necessary digital information into voice files, watermark information into video files such as screen recording file and etc. This ensures the authenticity in the transmission process of voice or video files and proves that following principles can be effectively implemented while avoiding legal risk.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 411px; width: 100.038%;\">\n<tbody>\n<tr>\n<td style=\"width: 56.4651%;\">\n<h3><strong>High Density System, Single Server Supports up to 4000 Channels<\/strong><\/h3>\n<p><strong>Since big corporation are applying artificial intelligence into contact centers and the compliance requirement and carbon emission reduction awareness are increasing, <\/strong><span style=\"color: #808080;\">high density with low cost of recording solution had been an important factor in choosing a contact center solution. VCLog released a system to support up to 3000 channels of concurrent recordings in a single server to provide possibility and support for corporations.<\/span><\/p>\n<\/td>\n<td style=\"width: 42.7907%;\"><img loading=\"lazy\" class=\"wp-image-3186 aligncenter\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/07\/\u5fae\u4fe1\u622a\u56fe_20220719114723-768x612-1.png\" alt=\"\" width=\"329\" height=\"262\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/07\/\u5fae\u4fe1\u622a\u56fe_20220719114723-768x612-1.png 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/07\/\u5fae\u4fe1\u622a\u56fe_20220719114723-768x612-1-300x239.png 300w\" sizes=\"(max-width: 329px) 100vw, 329px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 263px; width: 99.779%;\">\n<tbody>\n<tr>\n<td style=\"width: 437.523px;\"><img loading=\"lazy\" class=\"alignnone  wp-image-3192\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/07\/windowslinux-768x160-1.jpg\" alt=\"\" width=\"395\" height=\"83\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/07\/windowslinux-768x160-1.jpg 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/07\/windowslinux-768x160-1-300x63.jpg 300w\" sizes=\"(max-width: 395px) 100vw, 395px\" \/><\/td>\n<td style=\"width: 640.477px;\">\n<h3><strong>Support Linux and Windows OS, Better Fulfill Maintenance Requirements<\/strong><\/h3>\n<p><span style=\"color: #333333;\"><strong>Besides from supporting various versions of the Microsoft Windows OS, <\/strong><\/span><span style=\"color: #808080;\">VCLog also support other Linux OS with x86 architecture system such as CentOS, Euler, OpenEuler, Redhat, SUSE, ubuntu and UOS; and Linux OS with arm architecture system such as OpenEuler and UOS. Above mentioned Linux OS will be an important consideration since public cloud and private cloud of software are slowly migrating to Linux OS.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"color: initial; height: 476px; width: 99.4106%;\">\n<tbody>\n<tr>\n<td style=\"width: 607.153px;\">\n<h3><strong>VCLog BI Business Intelligence, Help to Build a Modern Contact Center<\/strong><\/h3>\n<p><strong>Empower the contact center with strong analytical capability. <\/strong><span style=\"color: #808080;\">VCLog able to integrate with VCLog BI (intelligence advanced reporting and analytic system) and provide customers with high availability and customizable intelligence data analytic product. This platform carries out data mining on customer behavior with advanced analysis tools and extract predictive content to discover the value in every customer interaction and provide effective basis for marketing decision.<\/span><\/p>\n<p><strong>Enhance customer-oriented business strategy by sharing the overall data of customer experience of the whole company. <\/strong><span style=\"color: #808080;\">The responsible manager will then have sufficient data basis to adjust the direction of service and business. Furthermore, continuously improve the customer service experience level, the operation and management efficiency of contact center, and the success rate of sales and marketing.<\/span><\/p>\n<\/td>\n<td style=\"width: 460.486px;\"><img loading=\"lazy\" class=\"wp-image-2424 alignright\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/51miz-E358482-B939C4F1.jpg\" alt=\"\" width=\"352\" height=\"351\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/51miz-E358482-B939C4F1.jpg 591w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/51miz-E358482-B939C4F1-300x300.jpg 300w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/51miz-E358482-B939C4F1-150x150.jpg 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 327px; width: 99.871%;\">\n<tbody>\n<tr>\n<td style=\"width: 443px;\"><img loading=\"lazy\" class=\"alignnone  wp-image-3313\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01.png\" alt=\"\" width=\"360\" height=\"355\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01.png 3113w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01-300x296.png 300w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01-1024x1010.png 1024w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01-768x757.png 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01-1536x1515.png 1536w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/10\/\u4ea7\u54c1\u7ec4\u5408-20221010-1-01-2048x2020.png 2048w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><\/td>\n<td style=\"width: 626px;\">\n<h3><strong>Product Combination Provides Complete Solution<\/strong><\/h3>\n<p>VCLog is one of the intelligent customer experience management product series. Products such as VCLog BI, ICCM, IBAE, Teleopti WFM, SoIP, MoIP, IMAM, IDHA, etc. can form a complete and flexible intelligent customer experience management solution. Each product from the combination can also be used in standalone mode or combined. While contact centers development is progressing, technology helps to provide customer with compliance and high-quality customer service thus assist the enterprise to enhance resilience.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 300px; width: 99.8196%;\">\n<tbody>\n<tr style=\"height: 135.094px;\">\n<td style=\"width: 103px; height: 135.094px; text-align: center;\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2418\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-01.png\" alt=\"\" width=\"208\" height=\"208\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-01.png 208w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-01-150x150.png 150w\" sizes=\"(max-width: 208px) 100vw, 208px\" \/><\/td>\n<td style=\"width: 392px; height: 135.094px; padding-left: 30px;\"><span style=\"font-size: 10pt;\">Support LDAP<\/span><br><span style=\"font-size: 10pt;\">Support single sign-on (SSO)<\/span><br><span style=\"font-size: 10pt;\">Support SBC SIPREC recording<\/span><br><span style=\"font-size: 10pt;\">Support License centralized allocation and management<\/span><br><span style=\"font-size: 10pt;\">Support Docker container and VM virtualization deployment<\/span><\/td>\n<td style=\"width: 100px; height: 135.094px; text-align: center;\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2419\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-02.png\" alt=\"\" width=\"208\" height=\"208\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-02.png 208w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-02-150x150.png 150w\" sizes=\"(max-width: 208px) 100vw, 208px\" \/><\/td>\n<td style=\"width: 389px; height: 135.094px; padding-left: 30px;\"><span style=\"font-size: 10pt;\"><strong>Support Voice + AI:<\/strong> Support dual-track PCM file recording and real-time voice streaming; integrate with market mainstream speech analysis engines<br><strong>Support Image + AI:<\/strong> Integrate with Optical Character Recognition (OCR) engine to recognize and record text content of agent screen<\/span><\/td>\n<\/tr>\n<tr style=\"height: 9px;\">\n<td style=\"width: 103px; text-align: center; height: 9px;\">&nbsp;<\/td>\n<td style=\"width: 421px; height: 9px;\">&nbsp;<\/td>\n<td style=\"width: 100px; text-align: center; height: 9px;\">&nbsp;<\/td>\n<td style=\"width: 418px; height: 9px;\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 150px;\">\n<td style=\"width: 103px; height: 150px; text-align: center;\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2420\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-03.png\" alt=\"\" width=\"208\" height=\"208\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-03.png 208w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-03-150x150.png 150w\" sizes=\"(max-width: 208px) 100vw, 208px\" \/><\/td>\n<td style=\"width: 392px; height: 150px; padding-left: 30px;\"><span style=\"font-size: 10pt;\">Support China mainstream database<\/span><br><span style=\"font-size: 10pt;\">Support China server such as Zhaoxin<\/span><br><span style=\"font-size: 10pt;\">Support China operating system such as Kylin<\/span><\/td>\n<td style=\"width: 100px; height: 150px; text-align: center;\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-2421\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-04.png\" alt=\"\" width=\"208\" height=\"208\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-04.png 208w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u4e91\u7aef\u667a\u80fd\u56fd\u4ea7\u6807\u51c6-EN-04-150x150.png 150w\" sizes=\"(max-width: 208px) 100vw, 208px\" \/><\/td>\n<td style=\"width: 389px; height: 150px; padding-left: 30px;\"><span style=\"font-size: 10pt;\">Support various database: MSSQL, MySQL, Oracle<\/span><br><span style=\"font-size: 10pt;\">Support various operating system: Windows 64-bit, Linux 64-bit<\/span><br><span style=\"font-size: 10pt;\">Support cross-browser: HTML5 architecture, no plugins required<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 668px; width: 99.7432%;\">\n<tbody>\n<tr style=\"height: 144px;\">\n<td style=\"width: 298px; height: 364.438px;\" rowspan=\"5\">&nbsp; <img loading=\"lazy\" class=\"alignnone  wp-image-2422\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN.png\" alt=\"\" width=\"270\" height=\"458\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN.png 2466w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN-177x300.png 177w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN-604x1024.png 604w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN-768x1302.png 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN-906x1536.png 906w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2021\/03\/\u8054\u7edc\u4e2d\u5fc3\u5f55\u97f3\u5f55\u50cf\u2014\u2014\u4ea7\u54c1\u4eae\u70b9-EN-1208x2048.png 1208w\" sizes=\"(max-width: 270px) 100vw, 270px\" \/><\/td>\n<td style=\"width: 348px; text-align: justify; vertical-align: top; height: 144px;\"><span style=\"font-size: 10pt; color: #000000;\">Quick Search and Playback<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Playback recording file within 3 seconds after conversation ended <br>Result searched within 5 seconds from massive quantity of recording files <br>Customized metadata tagging for effective and automated search <br>Audio, video, screen and IVR recording files are searched and played in one centralized interface <br>Standard Restful API to achieve business system integration and quick search <\/span><\/td>\n<td style=\"width: 20px; height: 144px;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/td>\n<td style=\"width: 377px; text-align: justify; vertical-align: top; height: 144px;\"><span style=\"font-size: 10pt; color: #000000;\">Outstanding New Technology Integration<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Support integration with SIPREC 2.0 protocol\/ standard <br>Support new feature such as Avaya POM outgoing call component <br>Support Cisco BIB and dynamic agent <br>Integrate with various market mainstream speech recognition engine and voiceprint recognition engine in real-time or offline <br>Support mainstream S3 object storage protocol in financial industry <br>Support multiple database main and backup high availability architecture <\/span><\/td>\n<\/tr>\n<tr style=\"height: 7px;\">\n<td style=\"width: 348px; text-align: justify; height: 15px; vertical-align: top;\">&nbsp;<\/td>\n<td style=\"width: 20px; height: 15px;\">&nbsp;<\/td>\n<td style=\"width: 377px; text-align: justify; vertical-align: top; height: 15px;\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 96px;\">\n<td style=\"width: 348px; text-align: justify; vertical-align: top; height: 96px;\"><span style=\"font-size: 10pt;\"><span style=\"color: #808080;\"><span style=\"font-size: 10pt; color: #000000;\">High Density; High Concurrent Configuration<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Single recording server supports up to 3000 channels configuration, 2000 of concurrent channels <br>Single system supports up to 100 recording servers for centralized management <br>Single system supports up to 200,000 channels configuration, 100,000 of concurrent channels <\/span><br><\/span><\/span><\/td>\n<td style=\"width: 20px; height: 96px;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/td>\n<td style=\"width: 377px; text-align: justify; vertical-align: top; height: 96px;\"><span style=\"font-size: 10pt;\"><span style=\"color: #808080;\"><span style=\"font-size: 10pt; color: #000000;\">High Availability<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Support various HA architecture 1+1, N+1, N+M, achieve 99.99% recording stability <br>Support massive amount of data architecture <br>Flexibly distribute data via hardware or software distribution method <br>Perform lossless distribution on high volume data <br>Avoid packet loss due to high load on network card caused by high volume data <\/span><br><\/span><\/span><\/td>\n<\/tr>\n<tr style=\"height: 5.4375px;\">\n<td style=\"width: 348px; text-align: justify; vertical-align: top; height: 15px;\">&nbsp;<\/td>\n<td style=\"width: 20px; height: 15px;\">&nbsp;<\/td>\n<td style=\"width: 377px; text-align: justify; vertical-align: top; height: 15px;\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 120px;\">\n<td style=\"width: 348px; text-align: justify; vertical-align: top; height: 120px;\"><span style=\"font-size: 10pt;\"><span style=\"color: #808080;\"><span style=\"font-size: 10pt; color: #000000;\">Automated Monitoring<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Intelligent categorization and storage of recording files according to business rule <br>Automation alarm notification to administrator when system failure <br>Automated monitoring and configuration according to business types of customer\u2019s conversation <br>The evaluation of customer service quality can be accelerated automatically through the analysis of acoustic wave pattern on conversation and silent event as well as agent screen activities. <\/span><\/span><\/span><\/td>\n<td style=\"width: 20px; height: 120px;\"><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/td>\n<td style=\"width: 377px; text-align: justify; vertical-align: top; height: 120px;\"><span style=\"font-size: 10pt; color: #000000;\">Various Recording Method<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Telephone channel recording<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Business screen recording<\/span><br><span style=\"font-size: 8pt; color: #808080;\">USB device recording<\/span><br><span style=\"font-size: 8pt; color: #808080;\">Other recording<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table style=\"height: 115px;\" width=\"1081\">\n<tbody>\n<tr>\n<td style=\"width: 1075.33px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 490px; width: 99.8851%;\">\n<tbody>\n<tr>\n<td style=\"width: 1073px;\">\n<h3><strong>A complete product series that provides the possibility for sustainable development<\/strong><\/h3>\n<p>We focus on research, development and production of &#8220;Customer Interaction Intelligent Management&#8221; related product. After a long period of experience accumulation, a complete product series has now been formed. Providing optional solutions for customer at each different development stage for &#8220;Customer Interaction&#8221;. With the maturity of artificial intelligence technology, we will continue to combine new artificial intelligence technology to develop more intelligent products, so that &#8220;Customer Interaction Intelligent Management&#8221; can achieve sustainable development.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" class=\"wp-image-3346 aligncenter\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-scaled.jpg\" alt=\"\" width=\"902\" height=\"249\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-scaled.jpg 2560w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-300x83.jpg 300w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-1024x283.jpg 1024w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-768x212.jpg 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-1536x424.jpg 1536w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/UCCC-Product-Family-\u5df2\u6062\u590d-06-2048x566.jpg 2048w\" sizes=\"(max-width: 902px) 100vw, 902px\" \/><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 103px;\" width=\"1084\">\n<tbody>\n<tr>\n<td style=\"width: 1078px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table style=\"height: 78px;\" width=\"1072\">\n<tbody>\n<tr>\n<td style=\"width: 1066.67px;\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 317px; width: 99.7251%;\">\n<tbody>\n<tr>\n<td style=\"width: 38.1123%;\">\n<h5><strong>Related Product List<\/strong><\/h5>\n<p><span style=\"font-size: 10pt;\">836-0002-002\/L\uff0cVCLog Standard Package (Linux)<br>836-0001-002\uff0cVCLog Standard Package (Windows)<br>836-0002-005\/L\uff0cVCLog Advance Package (Linux)<br>836-0001-005\uff0cVCLog Advance Package (Windows)<br>836-1800-001\uff0cVCLog RESTful API<br>836-9900-005\uff0cVCLog Voice Recording License for IP<br>836-9600-001\uff0cVCLog Voice &amp; Video Recording License for IP<\/span><br><span style=\"font-size: 10pt;\">836-****-***\uff0cProduct is not all listed out, please call for inquiry<\/span><\/p>\n<\/td>\n<td style=\"width: 60.9319%;\"><img loading=\"lazy\" class=\"wp-image-3363 alignright\" src=\"http:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02.png\" alt=\"\" width=\"607\" height=\"195\" srcset=\"https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02.png 3097w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-300x97.png 300w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-1024x331.png 1024w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-768x248.png 768w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-1536x496.png 1536w, https:\/\/www.voicecyber.com\/wp-content\/uploads\/2022\/11\/\u76f8\u5173\u4ea7\u54c1\u5217\u8868\u56fe-02-2048x661.png 2048w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Record Every Voice, Every Interaction Record every conv [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":95,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/pages\/4"}],"collection":[{"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":83,"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":3971,"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/pages\/4\/revisions\/3971"}],"up":[{"embeddable":true,"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/pages\/95"}],"wp:attachment":[{"href":"https:\/\/www.voicecyber.com\/index.php\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}