Bobboz - Fotolia
WebRTC enables browsers to establish real-time communications that would otherwise require web clients at both the sending and receiving ends. WebRTC services supplement unified communications architecture and, more importantly, can be part of a real-time collaboration strategy.
WebRTC and UC are not mutually exclusive. WebRTC is an open source project with APIs to enable communication, so the possibilities are plentiful. More than 700 companies use WebRTC services in some form, with Facebook the latest high-profile adopter. WebRTC is supported by a variety of web browsers and operating systems.
So, how can WebRTC services fit into your UC architecture? The capabilities are up to your imagination.
One huge benefit of WebRTC services is the ability to have devices with different operating systems share a platform for communications. Communications-enabled browsers eliminate the need to download clients and can reduce costs for businesses that rely heavily on devices.
Instead of buying Skype for Business clients, for example, WebRTC allows the same communication on browsers, which already exist on users' devices. From a security standpoint, you'll want to set policies for camera and microphone access so the devices are only accessed during communications.
I suggest researching where WebRTC services could supplement or, in some cases, replace large parts of your platform. Some UC platforms already have hooks into WebRTC APIs. When evaluating potential providers, ask about their plans for open-system interfaces.
Lastly, have a plan for browser updates. WebRTC has updated to operate over HTTPS only for additional security, so older HTTP clients will want to update.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Best practices to manage WebRTC services
Test your knowledge of WebRTC architecture
How WebRTC and APIs influence contextual communications
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Higbie Goetz
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your ... Continue Reading
Traditional and cloud SIP trunking perform the same tasks of initiating and ending call sessions, but the method and costs of access create distinct ... Continue Reading
The rules around E911 location tracking have evolved as more businesses move away from traditional wired connections to VoIP. Here's how to stay ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.