BSI approval for VS-NfD-compliant video conferences

Share post

ECOS Technology enables VS-NfD-compliant video conferences. The successfully completed BSI approval for the ECOS SecureBootStick in connection with the ECOS SecureConferenceCenter.

Video conferencing is also playing an increasingly important role in sensitive, security-critical areas. After a successfully completed approval process by the Federal Office for Information Security (BSI), the ECOS SecureBootStick, in conjunction with the ECOS SecureConferenceCenter (SCC), can now be used to conduct highly protected video conferences and online meetings that meet the requirements for the VS -NfD, EU and NATO RESTRICTED meet.

The video conferencing solution for VS-NfD can be used on any standard laptop or PC. This is made possible by correspondingly extended SecOps (application and operating conditions) of the BSI-approved ECOS SecureBootStick. In addition to being used for secure meetings and service briefings in authorities, companies subject to confidentiality protection or institutions in the critical infrastructure segment (KRITIS), the video conferencing solution is also suitable, for example, for further training and digital teaching with correspondingly classified content.

Collaboration via video communication

The ECOS SecureConferenceCenter provides users with all the important functions for online meetings and collaboration that are also known from other video conference applications. This includes, for example, the option of sharing your own screen as well as audio and video streams. A multi-user whiteboard allows for interactive collaboration between the participants. A breakout room function for dividing a video conference into several individual rooms is also available, as are session recordings, chat, emojis or notes that can be shared.

“For video conferences and online meetings, many companies have been forced to use cloud solutions with sometimes questionable security standards, which are more justified for less sensitive conference content. Security-conscious companies, secret protection organizations and authorities can effectively secure their video communication with the combination of ECOS SecureBootStick and ECOS SecureConferenceCenter, which has recently been approved by the BSI, and establish a highly protected communication channel. At the same time, the solution offers all the usual functions and options for interaction and teamwork,” says Paul Marx, Managing Director of ECOS Technology GmbH.

On-premises ensures complete control over the data

The ECOS SecureConferenceCenter can be operated completely on-premises, so that organizations retain full control over their data. Within secure networks, access to the conference room is via a standard browser. When used externally, for example from a private computer in the home office, the BSI-approved ECOS SecureBootStick ensures secure access from a specially encapsulated environment - including complete separation between business and private use of the computer used.

Administration via Smart Management

The ECOS SecureConferenceCenter can be conveniently managed with the ECOS SystemManagementAppliance via a uniform interface. Seamless integration into an existing IT landscape, for example by linking to a Microsoft Active Directory, can also be implemented.

More at ECOS.de

 


About ECOS Technology

ECOS Technology GmbH has specialized in the development and sale of IT solutions for highly secure remote access as well as the management of certificates and smart cards. The core products that are used in a wide variety of industries include the ECOS SECURE BOOT STICK and the PKI appliance ECOS TRUST MANAGEMENT APPLIANCE. Companies, authorities and organizations are thus able, for example, to create, extend or withdraw their own certificates, to connect employees in the home office, to provide quickly usable, cost-efficient emergency workplaces for crises or to maintain industrial plants remotely safely and securely.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more