MEETING
Switch to video conferencing
With Meeting mode, collaborate freely over video conferencing,
without compromising your confidentiality
Authentic and protected exchanges
Ephemeral chat
in meetings
Boost interactivity during your meeting with the ephemeral in-meeting chat: ask questions, share clarifications, notify participants, share documents...
Ephemeral, it protects your secrets: all messages and files shared in the discussion are wiped as soon as your meeting ends.
Screen sharing and
remote control
Enjoy the fluidity and quality of end-to-end encrypted screen and application sharing with Tixeo.
Streamline remote team support: request screen control for assistance or training purposes.
End-to-end encrypted
communications
Communicate with your team or partners in complete confidentiality.
Tixeo's end-to-end encryption prevents any interception of your communication streams (audio, video and data), regardless of the number of participants connected to the meeting.
No risk of espionage.
CSPN Certified by ANSSI since 2017
Since 2017, Tixeo has received the CSPN certification from France's National Cybersecurity Agency (ANSSI) three times, demonstrating its reliability and ongoing commitment. Its cybersecurity expertise is recognized within numerous French and European associations.
3 steps to organize a Tixeo meeting
-
1
Pick your attendees, keep intruders out
Schedule your meeting and invite participants by email. To eliminate any zoombombing risk, only designated people can join the meeting: their entry must be validated by the organizer.
Anti-zoombombing -
2
Adjust security in one click
Choose a security profile predefined by your administrator. The organizer applies the right level of protection with no technical configuration.
Tailored security
Maximum protection, zero complexity. -
3
Your guests get everything they need
Each participant receives an email invitation with all the details to join the meeting on the scheduled date, with no unnecessary steps.
Simplified access
Easy access to your
video conference, with full control
With web access, phone access and rights management, your meeting is easy to join while remaining fully under control.
During the exchange, the organizer keeps full control of participant rights at all times (microphone, camera and screen sharing).
Take collaboration further
-
Recording your video conferences
For traceability needs, you can record your meeting: a red indicator and a recording module appear on screen to signal the start.
-
Meeting summary
and translation of discussionsOnce your meeting is recorded, Tixeo AI can translate and summarize your discussions without compromising your confidentiality.
-
Switch between modes
During a video conference, choose to leave Meeting mode to join Conference mode, without having to schedule a new video conference.
Everything you need to know about Tixeo's Meeting mode
-
Can you join a meeting without installing software or creating an account?
Yes, if the organizer has allowed it in the meeting's access settings. Thanks to Tixeo's interoperability, your guests can join the video conference directly from their web browser, for a smooth experience without prior installation.
-
What happens when I share my screen — is the data protected?
Absolutely. Unlike other solutions that treat screen sharing as a less protected secondary stream, Tixeo applies end-to-end encryption to all streams: audio, video, but also screen sharing and transferred documents, regardless of the number of people connected to the meeting in progress. No data is decrypted on Tixeo's servers.
-
How can you make sure an intruder doesn't join the meeting?
Tixeo was designed following Secure by Design principles: security is at the heart of its solution. By default, the organizer must validate each entry into a meeting. You can also choose to restrict access to authenticated Tixeo account holders for the most sensitive meetings.
-
Why are messages and files deleted after the meeting
It's an additional safeguard to guarantee post-meeting confidentiality. By not storing any discussion history or file on a server after the room is closed, Tixeo eliminates any risk of subsequent data leakage.
In Workspaces, messaging is persistent and your discussions and documents remain accessible at all times, even for new group members.
-
Can you really take remote control of a colleague's screen securely?
Yes. Remote control is a built-in feature that requires double validation: the user must explicitly accept the takeover request, and can regain control or cut sharing at any time with a single click.
-
Does Meeting mode consume a lot of bandwidth?
Tixeo uses an intelligent stream adaptation technology (SVC - Scalable Video Coding). Quality adjusts in real time based on each participant's connection. This guarantees a smooth meeting, even for remote workers with a limited connection, without ever breaking the encryption chain.
-
How does Tixeo video conferencing compare to Teams or Zoom?
The difference is not only in features, but in the confidentiality guarantee. Unlike solutions subject to extraterritorial laws (e.g. Cloud Act), Tixeo reinforces control over data and communications:
- Certified security: Tixeo is the only video conferencing solution whose technology has been CSPN certified by ANSSI since 2017, guaranteeing a level of robustness audited by the State.
- Real end-to-end encryption: Where other solutions often only encrypt transport (TLS), Tixeo guarantees that no data (audio, video, chat) can be decrypted on the server, not even by us.
- Zero footprint: Tixeo's Meeting mode prioritizes ephemerality (automatic deletion of chat and shared files), avoiding the creation of sensitive data silos stored indefinitely on third-party servers. It's the choice for those for whom information protection is an absolute priority.
20 years
of expertise in
secure collaboration
An independent French company and a leading player in cybersecurity in France, Tixeo guarantees the performance of your online communications and the security of your data.
Its R&D teams develop innovative video conferencing technology, built on accessibility and technical excellence criteria, to meet the most demanding requirements.