Secure by design

Secure from the start

Tixeo integrates Secure by Design principles
at every stage of development.

More than a necessity, a commitment

Tixeo’s video conferencing technology is not merely a collection of secure features stitched together: its global architecture is based on the Secure by Design approach.

Secure by Design principles

With cybersecurity prioritised from the very first stage of software design, the risks of security breaches and failures are limited

Before starting the Tixeo development process, potential vulnerabilities are detected and analysed, such as interactions between users and with connected services.

Following the identification of vulnerabilities, solutions are implemented during development to address issues and better respond to threats.

Verification and validation are two key aspects of Secure by Design.

  • Verification ensures that the solution complies with the design specifications.
  • Validation ensures that the solution meets user requirements.

Tixeo's rigorous access management, right from the outset, reduces the number of exploitable entry points into the solution.

Before starting the Tixeo development process, potential vulnerabilities are detected and analysed, such as interactions between users and with connected services.

Following the identification of vulnerabilities, solutions are implemented during development to address issues and better respond to threats.

Verification and validation are two key aspects of Secure by Design.

  • Verification ensures that the solution complies with the design specifications.
  • Validation ensures that the solution meets user requirements.

Tixeo's rigorous access management, right from the outset, reduces the number of exploitable entry points into the solution.

3 key criteria

End-to-end encryption

Communication flows (audio, video, data) are encrypted from end to end, regardless of the number of participants in the online meeting.

Tixeo has no backdoor, in compliance with European regulations.

Access privileges

Each Tixeo user’s access rights are precisely defined.  The administrator has rights to manage server settings, while the subscription manager appoints meeting organizers.

Meeting guests have minimal rights, which reduces the risk of unauthorized access and zoombombing.

Technological independence

By controlling its entire tech stack, Tixeo avoids dependency on third-party services and limits the risks of supply chain attacks. Despite owning its technology, Tixeo is transparent and allows some of its customers to audit its source code.

End-to-end encryption

Communication flows (audio, video, data) are encrypted from end to end, regardless of the number of participants in the online meeting.

Tixeo has no backdoor, in compliance with European regulations.

Access privileges

Each Tixeo user’s access rights are precisely defined.  The administrator has rights to manage server settings, while the subscription manager appoints meeting organizers.

Meeting guests have minimal rights, which reduces the risk of unauthorized access and zoombombing.

Technological independence

By controlling its entire tech stack, Tixeo avoids dependency on third-party services and limits the risks of supply chain attacks. Despite owning its technology, Tixeo is transparent and allows some of its customers to audit its source code.

Benefits of Secure by Design Tixeo video conferencing

Communication security

End-to-end encryption technology is built into the solution by default and protects the confidentiality of the most critical communications.

Data protection

By addressing security vulnerabilities early in the design process, Tixeo secures user data (contact names, meeting titles, messages, emails, phone numbers…).

Reliability and sovereignty

Developed by its R&D teams in France and hosted in Europe, Tixeo is an independent solution fully committed to the cybersecurity and cyber-resilience of sensitive organisations.

Communication security

End-to-end encryption technology is built into the solution by default and protects the confidentiality of the most critical communications.

Data protection

By addressing security vulnerabilities early in the design process, Tixeo secures user data (contact names, meeting titles, messages, emails, phone numbers…).

Reliability and sovereignty

Developed by its R&D teams in France and hosted in Europe, Tixeo is an independent solution fully committed to the cybersecurity and cyber-resilience of sensitive organisations.

Since 2017, the French Cybersecurity Agency (ANSSI) has renewed Tixeo’s CSPN certification three times, demonstrating its reliability and commitment to cybersecurity.

For a CIO or a security manager, protecting access to corporate networks and systems is a priority. Tixeo’s Secure by design adapts to the most stringent secure deployment requirements.

Secure by Design and Privacy by design software

The development and growing number of cyber-threats are threatening the confidentiality of online communications.

To strengthen cybersecurity and data protection of communication tools, Secure by Design and Privacy by Design are two essential approaches.

However, these approaches go beyond purely technical considerations.

Tixeo complies with Secure by Design and Privacy by Design principles as well as with European regulations (RGPD, NIS 2, DORA) for the security of organisations.

Secure by design

Privacy by design

Definition

Integrate security from the design of Tixeo software.

Integrate privacy by design into Tixeo services.

Main goal

Protect the solution against cyber attacks and vulnerabilities.

Protect users’ privacy and minimize personal data processing.

Scope of application

Cybersecurity, IT infrastructure, systems and software protection.

Compliance with European data protection regulations (RGPD).

Fundamental measures

  • IT resilience
  • Multi-factor authentication
  • End-to-end encryption
  • Vulnerability management
  • Intrusion detection and prevention
  • Data minimisation
  • User consent
  • Transparency of processing
  • Securing personal data
  • Controlling access to information

Examples of technical measures

Implementation of robust security measures (firewall, IDS/IPS, Zero Trust).

Daily database backups, granular access controls, and encryption of the hard drives on staff workstations that process personal data.

Impact on businesses

Reduces the risk of cyber-attacks, improves infrastructure security and boosts user confidence.

Ensures regulatory compliance, limits data breaches, protects the company’s reputation and strengthens customer confidence.

Secure by design

Definition

Integrate security from the design of Tixeo software.

Main goal

Protect the solution against cyber attacks and vulnerabilities.

Scope of application

Cybersecurity, IT infrastructure, systems and software protection.

Fundamental measures

– IT resilience
– Multi-factor authentication
– End-to-end encryption
– Vulnerability management
– Intrusion detection and prevention

Examples of technical measures

Implementation of robust security measures (firewall, IDS/IPS, Zero Trust).

Impact on businesses

Reduces the risk of cyber-attacks, improves infrastructure security and boosts user confidence.

Privacy by design

Definition

Integrate privacy by design into Tixeo services.

Main goal

Protect users’ privacy and minimize personal data processing.

Scope of application

Compliance with European data protection regulations (RGPD).

Fundamental measures

– Data minimisation
– User consent
– Transparency of processing
– Securing personal data
– Controlling access to information

Examples of technical measures

Daily database backups, granular access controls, and encryption of the hard drives on staff workstations that process personal data.

Impact on businesses

Ensures regulatory compliance, limits data breaches, protects the company’s reputation and strengthens customer confidence.

Icône Failles de sécuritéSébastien Jeanjean,
Tixeo Managing Director.

« At Tixeo, we place data and communications security at the heart of our commitment.

In today’s uncertain digital landscape, our video conferencing solution “Secure by design” has established itself within large organisations, notably in defence, industry and finance.

RGPD compliant, we are recognised in the French and European cybersecurity ecosystem for ensuring the confidentiality of critical information and digital and technological sovereignty. »

cyberespionnage

Tixeo, an independent French company, has been developing its proprietary secure video conferencing technology for 20 years.

The solution is based on a secure architecture that contributes to the digital resilience of organisations. Because the integration of security should never be a latecomer, but a fundamental aspect of the communication tool.

Everything you need to know about Secure By Design

3
5

Definition of Secure by Design

What is Secure by Design?
Secure by Design is a proactive approach that involves integrating security right from the design stage of software or a system. This means that the application of rigorous security principles and the application of rigorous security principles and secure defaults minimises security issues from the earliest stages of design.

What are the principles of Secure by Design?
The implementation of a rigorous security policy is essential to guarantee optimum protection. Secure by Design is also based on several key principles, from the design phase onwards to ensure more secure software:

  • minimising the attack surface
  • maintaining a consistently high level of security
  • reducing risks by adopting secure coding practices
  • regularly assessing security measures to address new threats

What are the advantages of Secure by Design?
With Secure by Design, software is more reliable and resilient. Other benefits include reduced risk, improved security, protection against cyberattacks and more efficient development.

Guaranteeing the confidentiality of communications through end-to-end encryption means that data in transit remains protected from interception.

3
5

Tixeo's Secure by Design approach

Why does Tixeo adopt a Secure by Design approach?
Every day, companies see their networks and software exposed to attacks. Communication tools are prime targets for hackers.

Indeed, cybercriminals exploit flaws in video conferencing systems, such as backdoors or vulnerabilities in the software architecture, to intercept sensitive exchanges or simply disrupt online meetings.

How does Tixeo integrate security in its design?
Tixeo adopts robust security practices throughout the software development lifecycle. This includes code reviews, automated security tests, and proactive threat management for defence in depth. Its secure software is based on strict cyber security principles.

3
5

Software security and resilience

How does Secure by design enhance resilience?
Tixeo's adoption of the Secure by Design approach ensures security by reducing vulnerabilities at the earliest stages of design. This avoids adding layers of security as we go along, and reduces the costs of late-stage patching. In addition, Tixeo cultivates this commitment to cybersecurity internally, with its teams, to ensure lasting protection, throughout the organisation.

Implementing a business continuity plan in the event of a threat is one of the best practices for strengthening digital operational resilience. Tixeo's customer organisations rely on the solution to continue their exchanges even in crisis situations.

How to assess the security of a product or software?
To assess security, it is crucial to perform a risk analysis, apply security measures, and perform penetration tests to identify potential vulnerabilities. Security certifications can also help validate trusted software. This is the case with the CSPN certification from ANSSI (Agence nationale pour la sécurité des systèmes d'informations), which Tixeo has received 3 times in 8 years.

What are the best practices in terms of security?
Under Secure by Design, security best practices include secure coding, system security, and the adoption of agile development and continuous integration. The Secure by Design approach requires security principles to be integrated throughout the development cycle, right up to deployment in the cloud or on dedicated servers within the organisation (on-premises). Tixeo also implements end-to-end encryption and multi-factor authentication to strengthen access security, and complies with IT security standards and regulations.

3
5

Differences between Secure by Design and Privacy by Design

What are the differences between Secure by Design and Privacy by Design?
Secure by Design and Privacy by Design are two fundamental and complementary approaches to cybersecurity and data protection. Although they share common principles, they have distinct objectives and implementations.

  • Secure by Design provides key principles for the secure design of software and services, and relies on mechanisms such as encryption, multi-factor authentication and access monitoring to anticipate threats.
  • Privacy by Design ensures that personal information is hosted, stored, and processed in full compliance with data protection laws.

Software may be secure against attacks but still fail to comply with data protection regulations. Conversely, software that respects privacy may be vulnerable to cyber attacks. The two approaches are therefore inseparable when it comes to building a trusted digital ecosystem. That's why, for global protection, Tixeo takes both approaches into account.

3
5

Definition of Secure by Design

What is Secure by Design?
Secure by Design is a proactive approach that involves integrating security right from the design stage of software or a system. This means that the application of rigorous security principles and the application of rigorous security principles and secure defaults minimises security issues from the earliest stages of design.

What are the principles of Secure by Design?
The implementation of a rigorous security policy is essential to guarantee optimum protection. Secure by Design is also based on several key principles, from the design phase onwards to ensure more secure software:

  • minimising the attack surface
  • maintaining a consistently high level of security
  • reducing risks by adopting secure coding practices
  • regularly assessing security measures to address new threats

What are the advantages of Secure by Design?
With Secure by Design, software is more reliable and resilient. Other benefits include reduced risk, improved security, protection against cyberattacks and more efficient development.

Guaranteeing the confidentiality of communications through end-to-end encryption means that data in transit remains protected from interception.

3
5

Tixeo's Secure by Design approach

Why does Tixeo adopt a Secure by Design approach?
Every day, companies see their networks and software exposed to attacks. Communication tools are prime targets for hackers.

Indeed, cybercriminals exploit flaws in video conferencing systems, such as backdoors or vulnerabilities in the software architecture, to intercept sensitive exchanges or simply disrupt online meetings.

How does Tixeo integrate security in its design?
Tixeo adopts robust security practices throughout the software development lifecycle. This includes code reviews, automated security tests, and proactive threat management for defence in depth. Its secure software is based on strict cyber security principles.

3
5

Software security and resilience

How does Secure by design enhance resilience?
Tixeo's adoption of the Secure by Design approach ensures security by reducing vulnerabilities at the earliest stages of design. This avoids adding layers of security as we go along, and reduces the costs of late-stage patching. In addition, Tixeo cultivates this commitment to cybersecurity internally, with its teams, to ensure lasting protection, throughout the organisation.

Implementing a business continuity plan in the event of a threat is one of the best practices for strengthening digital operational resilience. Tixeo's customer organisations rely on the solution to continue their exchanges even in crisis situations.

How to assess the security of a product or software?
To assess security, it is crucial to perform a risk analysis, apply security measures, and perform penetration tests to identify potential vulnerabilities. Security certifications can also help validate trusted software. This is the case with the CSPN certification from ANSSI (Agence nationale pour la sécurité des systèmes d'informations), which Tixeo has received 3 times in 8 years.

What are the best practices in terms of security?
Under Secure by Design, security best practices include secure coding, system security, and the adoption of agile development and continuous integration. The Secure by Design approach requires security principles to be integrated throughout the development cycle, right up to deployment in the cloud or on dedicated servers within the organisation (on-premises). Tixeo also implements end-to-end encryption and multi-factor authentication to strengthen access security, and complies with IT security standards and regulations.

3
5

Differences between Secure by Design and Privacy by Design

What are the differences between Secure by Design and Privacy by Design?
Secure by Design and Privacy by Design are two fundamental and complementary approaches to cybersecurity and data protection. Although they share common principles, they have distinct objectives and implementations.

  • Secure by Design provides key principles for the secure design of software and services, and relies on mechanisms such as encryption, multi-factor authentication and access monitoring to anticipate threats.
  • Privacy by Design ensures that personal information is hosted, stored, and processed in full compliance with data protection laws.

Software may be secure against attacks but still fail to comply with data protection regulations. Conversely, software that respects privacy may be vulnerable to cyber attacks. The two approaches are therefore inseparable when it comes to building a trusted digital ecosystem. That's why, for global protection, Tixeo takes both approaches into account.