CyberDSA on August 6-8 in Kuala Lumpu

Border Controller

Mask the real IP address of your video conferencing system and restrict access to it from unwanted connections outside the corporate network.

Border Controller

The Scheme of Operation of the Border Controller

The Scheme of Operation of the Border Controller

Work in a Corporate Network

The edge controller ensures safe operation inside a closed corporate network, restricting access from unwanted connections to your video conferencing server if necessary.

Work in a Corporate Network

Secure Connection

Thanks to the border controller, data transfer is carried out only via the proprietary TrueConf protocol, ensuring the security of the connection.

Secure Connection

Additional Level of Protection

The edge controller provides an additional degree of protection by hiding the real IP address of your video conference server.

Additional Level of Protection

Data Encryption

Enable additional traffic encryption to create a secure data channel.

Data Encryption

Border Controller Typical Implementation Scheme

Border Controller Typical Implementation Scheme

Implemented Projects

We have implemented thousands of successful projects around the world for government and financial institutions, as well as law enforcement agencies, industry, education, and medicine.

Implemented Projects

Make communication safer with TrueConf!

Latest News

2024-07-10

TrueConf Server 5.4 major update: simultaneous interpretation, infinite video layouts, and new messenger features

2024-04-26

TrueConf Server 5.3.4: updates and improvements

2023-12-13

TrueConf Server 5.3.3: updates and improvements