With the convergence of data and telephony networks and
the ubiquity of RTC (including VoIP, UC, and mobile phones),
hacking has come full circle as telephony attacks are on the
rise — or, more correctly, re‐rise. As a consequence, enterprises
must revisit their RTC security posture using a holistic
approach, to ensure the integrity and availability of these
applications and systems, as well as the confidentiality and
privacy of sensitive data on converged networks and data
center infrastructures.