Bengaluru Tech Summit 2024 on November 19-21 in India

Border Controller

Mask the real IP address of your video conferencing system and restrict access to it from unwanted connections outside the corporate network.

Border Controller

The Scheme of Operation of the Border Controller

The Scheme of Operation of the Border Controller

Work in a Corporate Network

The edge controller ensures safe operation inside a closed corporate network, restricting access from unwanted connections to your video conferencing server if necessary.

Work in a Corporate Network

Secure Connection

Thanks to the border controller, data transfer is carried out only via the proprietary TrueConf protocol, ensuring the security of the connection.

Secure Connection

Additional Level of Protection

The edge controller provides an additional degree of protection by hiding the real IP address of your video conference server.

Additional Level of Protection

Data Encryption

Enable additional traffic encryption to create a secure data channel.

Data Encryption

Border Controller Typical Implementation Scheme

Border Controller Typical Implementation Scheme

Implemented Projects

We have implemented thousands of successful projects around the world for government and financial institutions, as well as law enforcement agencies, industry, education, and medicine.

Implemented Projects

Make communication safer with TrueConf!

Latest News

TrueConf Server 5.4.3: updates and improvements

TrueConf Server 5.4.3: updates and improvements

TrueConf Server 5.4.2: auto spotlight of speaker in the browser, support for 60 fps, and new MCU mode

TrueConf Server 5.4.2: auto spotlight of speaker in the browser, support for 60 fps, and new MCU mode

TrueConf Server 5.4.1: updates and improvements

TrueConf Server 5.4.1: updates and improvements