TixeoServer
Your fully controlled collaboration solution, at the heart of your infrastructure
Tixeo technology deployed directly on your own on-premises servers. For complete control over your data.
Strengthen
your independence
With TixeoServer, you are independent from any third-party provider: you manage your resources, backups, and access according to your own rules. All your data stays on your servers. No interference.
Meet your
critical needs
Your most demanding network security policies are fully met. TixeoServer can be deployed in air-gapped or restricted network environments, ensuring your business continuity.
Streamline integration into
your ecosystem
Leverage our APIs, automated user management through your internal directories (LDAP/AD), and interface customization for seamless adoption alongside your own business tools.
TixeoServer incorporates Tixeo technology CSPN-certified by ANSSI since 2017
Discover the TixeoServer offer in detail
- Number of organizers: from 50
- Unlimited meetings and duration
- 3 collaboration modes (Meeting, Workspaces, Conference)
- End-to-end encrypted video conferencing
- End-to-end encrypted messaging
- End-to-end encrypted file sharing
- End-to-end encrypted ephemeral in-meeting chat
- End-to-end encrypted screen sharing and control
- Outlook integration
- Highest security level (Tixeo technology, CSPN-certified by ANSSI)
- True end-to-end encryption (E2EE)
- On-premises hosting
- GDPR, NIS2, DORA compliance
- Protection against extraterritorial laws
- Security profiles
- Multi-factor authentication / SSO
- Tixeo secure application (Windows, Mac, Linux, Android, iOS)
- Free access for all invited participants
- Directory synchronization (LDAP / Active Directory)
- Centralized administration console
- Enhanced rights and access management
- Detailed usage statistics
- Immediate onboarding
- Technical support based in France
- Service availability guarantee (SLA)
Discover the TixeoServer offer in detail
- Number of organizers: from 50
- Unlimited meetings and duration
- 3 collaboration modes (Meeting, Workspaces, Conference)
- Encrypted video conferencing (E2EE)
- Encrypted rich messaging (E2EE)
- Encrypted file sharing (E2EE)
- Encrypted ephemeral chat (E2EE)
- Encrypted screen sharing (E2EE)
- Outlook integration
- Highest security level, CSPN-certified by ANSSI
- True end-to-end encryption (E2EE)
- On-premises hosting
- GDPR, NIS2, DORA compliance
- Protection against extraterritorial laws
- Security profiles
- MFA/SSO
- Tixeo secure application (Windows, Mac, Linux, Android, iOS)
- Free access for all invited participants
- Directory synchronization (LDAP / Active Directory)
- Centralized administration console
- Rights and access management
- Detailed usage statistics
- Immediate onboarding
- Technical support based in France
- Service availability guarantee (SLA)
Why choose the Tixeo On-Premises solution?
Full
control
Supports
compliance
(GDPR, NIS 2, Cyber Resilience Act)
Bandwidth
savings
Enhanced customization and integration
Enhanced customization and integration
Want to learn more?
Find out how to deploy TixeoServer within your infrastructure
Book your personalized demonstration today.
Request a compliance assessment Request a demo
Everything you need to know about Tixeo's On-Premises offer
How does TixeoServer ensure traffic isolation in an air-gapped network?
TixeoServer was designed for the most constrained environments. The server can operate in full standalone mode, with no internet access whatsoever. Authentication, connection brokering, and traffic encryption all take place locally within your secure environment. It is the recommended solution for accredited information systems or classified projects.
What protection mechanisms are in place against traffic injection or interception on the LAN?
Beyond end-to-end encryption (AES-256), Tixeo uses a proprietary architecture that does not rely on vulnerable standard protocols. Each stream is authenticated and encrypted before it even leaves the user's device. Even with physical access to the internal network, an attacker cannot intercept communications or inject data into an ongoing video conference.
How does the solution integrate with a Zero Trust strategy?
Tixeo aligns seamlessly with Zero Trust architectures: access to the service is strictly conditioned on identity (integration with your secure directories), and every endpoint must be authenticated. The server trusts no traffic by default, ensuring that only authorized users and devices can initiate or join a meeting.
Is it possible to restrict features by user profile to comply with our ISSP?
Absolutely. The administrator can apply granular policies. For example, you can disable file transfer or recording for certain user groups, or tailor meeting access controls for others, ensuring strict compliance with your Information Systems Security Policy (ISSP).
Can communication logs and metadata be audited?
Yes. Unlike cloud solutions where logs are often incomplete or opaque, TixeoServer gives you full ownership of your event logs. You can export them to your SIEM (Splunk, ELK, etc.) for real-time analysis, event correlation, or to meet your statutory audit obligations.