Protecting devices connected to the UC system

Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies. Many currently available UC systems still do not implement proper policies or