Video Conferencing

Collaborate in private

Modern and secure collaboration

When everyone is on the same page, magical things can happen. But everyone should not include competitors and black hats. With our Secure Video Conferencing your organization can communicate face to face knowing what you say stays private.

Same availability, same capabilities, and way better security


Security features

Encryption* Key size Metadata protection Key management Geographic data routing DDoS protection Multi-cloud Record control IP-protection**

Standard features

Lowest bandwidth (kbps)*** Modern browser compatible In-conference text chat Unlimited conference rooms Screen sharing
  2x AES‑256 4096‑bit check_circle check_circle check_circle check_circle check_circle check_circle check_circle   128 check_circle check_circle check_circle check_circle
vidyo   AES‑128 check_circle highlight_off info_outline info_outline highlight_off highlight_off highlight_off highlight_off   650 check_circle check_circle check_circle check_circle
bluejeans   AES‑128 check_circle highlight_off info_outline info_outline highlight_off highlight_off highlight_off highlight_off   384 check_circle check_circle check_circle check_circle
  • *AES-128 with SRTP and TLS is fine, ours is better though. BlueJeans: source, Vidyo: source.
  • **IP-protection is our shorthand for saying IPv4‑, IPv6‑, WebRTC‑, and DNS‑leak protection.
  • *** Less kbps (kilobytes per second) is better. It means it will work on a slower connection. Sources for the bandwidth requirements of BlueJeans: source, and Vidyo: source.
screenshot of demo page Launch demo open_in_new


If you like what you see and want to secure your systems, give us a call and we will have a private system ready for you that day.


Data in transit is protected through multiple means of encryption and Dispel counter-reconnaissance metadata protection.

Client‑to‑server connections are encrypted using SHA‑256 with 4096‑bit RSA keys. Server-to-server connections are encrypted twice using AES‑256 with different 4096‑bit RSA keys for the initial exchange.

your secure conferencing can be hosted by all the major players in any country you choose.


Don’t want an EU data center? No problem. Control exactly where your comms are deployed. All Dispel infrastructure stays under the licensed control of your company.

Maintain custody over your cloud providers credentials and private keys. Regulatory compliance is easy with geographic restrictions, and logging.

Simple collaboration

Organize all of your conferences into rooms. Make a room for a team, a call, a pitch—anything.

Best of all, you get an unlimited number of rooms. Never drop a call again because of competing schedules.

image showing a user typing in the name for their secure conference room.
platforms that work with Dispel secure video conferences.


Dispel conferencing runs right in your browser and doesn’t require any plugins or extensions.

Never ask your counterpart to download an app or be force to ask them to sign up for an account.

Supported by all modern browsers—Chrome, Firefox, Opera, and Vivaldi—on macOS, Windows, Linux, and Android.

Ready for secure, international communication?

Talk to a human