TDoS
How does UC in the cloud impact your security posture?
UC applications such as voice, video, messaging and file sharing are transmitted over the same IP network as web and data applications and thus are prone to the same type of network attacks.