
The next generation of video telecommunications in defence
General Stanley McChrystal’s Team of Teams describes his experiences with the Joint Special Operations Task Force in Iraq. Realising that conventional military tactics were failing in the battle against the al-Qaeda insurgency, he made an investment decision; he bought a secure video conferencing system.
McChrystal understood the complexities of his battlefield required new strategies. The first step was reliable, eyeball to eyeball communication. Every day, without fail, he now had “face time” with his extended team across the world. He cites this as the beginning of the turnaround in the war.

Mission partner and ally communication
Australia’s strategic position in today’s geopolitical landscape necessitates an unprecedented level of information sharing with key partners. Alliances such as AUKUS, the Five Eyes (FVEY), and the broader Indo-Pacific network, along with individual nations like India, Japan, South Korea, and Pacific Island nations, require tailored and targeted communication. Strengthening these relationships through seamless and secure information exchange is essential for regional stability and co-operation.
Data-Centric Security (DCS) has emerged as a vital solution to the challenges of secure information sharing and communication. Unlike traditional perimeter-based models that focus on securing network boundaries, DCS prioritizes the protection of data itself—regardless of its location or transmission path. By encrypting data at rest and in transit, enforcing attribute-based access controls, and leveraging advanced authentication mechanisms, defense agencies can significantly reduce the risks of data breaches and unauthorized access. This approach not only strengthens security but also enhances collaboration between people, systems, and data, enabling faster and more secure information exchange.
For years, Defence and government organizations have relied on Data-Centric Security (DCS) to enable secure information sharing through a "deny-by-default, allow-by-exception" policy. Access is granted based on specific attributes such as nationality, rank, and security clearance, ensuring only authorized individuals can view sensitive data.
Australian companies like Janusnet and archTIS have developed military-grade DCS software that defines security labels and policies to enforce controlled access—an approach that has proven effective for securing emails and files. Now, this same principle is being extended to video conferencing with Pexip Secure Meetings. Attribute-Based Access Control (ABAC) enforces secure access to video meetings based on attributes like nationality, clearance, location, and device security. Integrated with DCS, it ensures policy-driven, exception-based access control.
By implementing granular access controls and policy-driven management, Defence organizations can customize video communication channels to meet the distinct security needs of each mission partner. This ensures real-time, face-to-face collaboration remains both effective and secure, enabling decision-makers to stay ahead of emerging threats.

Interoperability: bridging the past with the future
Pexip Secure Meetings has proved itself as a global best-of breed video platform and integrates not just with DCS systems but with a wide range of global and niche platforms, ensuring seamless collaboration across legacy and modern technologies. With Microsoft extending Skype for Business, Defence organizations can maintain familiar chat interfaces or transition to modern solutions like Rocket Chat, with Pexip enabling smooth escalation from chat to secure video meetings no matter the choice of the platform.
Reflecting the lessons of McChrystal’s Team of Teams, Pexip fosters interoperability by collaborating across industries, even with traditional competitors. Our mission is to maximize existing infrastructure investments while delivering new capabilities, ensuring Defence organizations stay agile and connected. We see the tech industry as being part of the team of teams that needs to provide capability.
Collaboration is the key to security; security must be the foundation for collaboration
Ensuring rapid deployment and redeployment of secure video conferencing is crucial. It must blend seamlessly into secure collaborative environments without sacrificing user experience. This way, defence agencies can harness the full power of telecommunications technology to safeguard national interests, protect critical infrastructure, and preserve peace and stability in an increasingly complex and interconnected world.
https://url.au.m.mimecastprotect.com/s/RBcrC0YKG8iGkgmkSwfgU9HAbV?domain=pexip.com