Over the years, the unified communications (UC) landscape has evolved from enabling different methods of communication across a single application to the integration of multiple methods across varying types of clients, merging at a single point from which a conversation can be managed.
As a result, a unique security challenge exists for UC providers and developers. Five years ago, for example, organizations leveraging UC solutions may have used one client for chat, voice, or video.