End of Skype for Business Server: rethink your communications strategy

End of Skype for Business Server: rethink your communications strategy

Microsoft is set to end extended support for Skype for Business Server (2015 and 2019) on 14 October 2025. From that point onwards, organisations will need to choose between migrating to a more costly, cloud-based solution or taking the opportunity to adopt a certified, European on-premise alternative.

A strategic and technological turning point

The upcoming end of support for Skype for Business Server marks a pivotal moment for companies and public sector bodies that had opted for an on-premise communications infrastructure, outside the major public cloud ecosystems.

In light of this change, customers are being steered towards Microsoft Teams – a cloud-based solution described by Microsoft as the “simplest alternative” – but one that is far from the most secure. This transition introduces both technological and legal dependency on cloud infrastructure governed by US legislation.

For those seeking to retain a Microsoft on-premise solution, the shift now presents a real strategic and operational challenge. Significant migration costs, licensing changes, and limited technical support make this option increasingly complex and difficult to sustain economically.

However, other viable alternatives do exist.

Switching tools without compromising your standards

A rapid move to Microsoft Teams might seem like the natural choice. However, this transition entails a number of risks:

  • Data hosted on US-based cloud services, subject to the Cloud Act (allowing US authorities to access user data under certain conditions),
  • Complicated access governance and auditability,
  • Unpredictable feature changes,
  • Reduced technical independence.

For organisations required to comply with regulations like NIS 2 or DORA – or those looking to bolster their digital sovereignty – migrating to Teams may raise more concerns than it resolves.

Deploying a new, on-premise communications platform that aligns with your organisation’s requirements in terms of security, sovereignty, and compliance could be the better route.

Why Stick With an On-Premise Communications Model?

Maintaining an on-premise solution addresses fundamental organisational needs – beyond just technical architecture. Key advantages include:

  • A bespoke setup tailored to your IT infrastructure and internal requirements,
  • Complete control over data, ensuring full GDPR compliance: local hosting, oversight of data flows and metadata, managed retention of content and access logs,
  • Strengthened security through system isolation – particularly valuable in sensitive or classified environments (e.g., defence, industry, energy, finance),
  • Business continuity, even without internet access or during cyber incidents,
  • Support for air-gapped and out-of-band communications, enabling secure exchanges even when offline.

Read the article: What Is an On-Premise Video Conferencing Solution?

4 key factors in choosing an alternative

When identifying a suitable replacement for Skype for Business Server, consider these essential criteria:

Secure by Design

Security must be embedded from day one. The architecture should be based on a Secure by Design approach – with no open inbound network ports, proactive vulnerability management, strong authentication, and detailed access control.

A reliable communications platform must also offer end-to-end encryption across all streams: audio, video, messaging, and file sharing.

Technological Sovereignty

The alternative should minimise reliance on foreign technology – especially solutions exposed to extraterritorial laws like the US Cloud Act – particularly for core components.

Opting for a proprietary solution developed by a European company – with R&D, ownership, capital, and support all based within Europe – significantly enhances trust and security. Independence from non-European providers ensures full control over infrastructure.

Regulatory Compliance

The platform must be fully compliant with the GDPR, both in data handling and in activity traceability. It should also support compliance with new EU regulations:

  • The NIS 2 Directive on cybersecurity for essential and important entities,
  • The DORA Regulation on digital operational resilience in the financial sector.

Deployment and Interoperability

Integration and interoperability must not be overlooked. The chosen solution should connect with existing infrastructure, support standard protocols (e.g., SIP, H.323), and offer APIs or connectors to facilitate integration into your information system.

Straightforward deployment is a major advantage, especially in complex or high-security environments.

Tixeo: a sovereign, secure, and european alternative

Tixeo is a secure video conferencing solution developed in Europe, designed to meet the highest standards of security, digital sovereignty, and regulatory compliance.

It now offers a credible and proven alternative to Skype for Business Server – especially for organisations determined to retain control over their strategic communications.

With fully proprietary technology, CSPN certification from ANSSI, and full on-premise deployment capabilities (via TixeoServer) – including in air-gapped or isolated environments – Tixeo offers:

  • Secure by Design architecture,
  • End-to-end multipoint encryption,
  • Fine-grained access control,
  • Interoperability with SIP and H.323 telephony systems,
  • Support for GDPR, NIS 2, and DORA compliance,
  • Simplified and secure on-premise deployment, with only one open port and no listening ports on workstations.

Tixeo’s on-premise model: meeting your strategic needs

Your ChallengeTixeo’s Response
End of Skype for Business ServerSmooth migration to a sovereign on-premise solution
Avoiding public or extraterritorial cloudLocal or SecNumCloud-certified private cloud hosting
Operating in sensitive or offline settingsAir gap compatibility, internet-free operation
Protecting high-stakes communicationsCSPN-certified end-to-end encryption
Ensuring GDPR / NIS 2 / DORA complianceFull support and regulatory alignment
Pursuing technological independence100% European-owned solution, with no third-party dependencies

Trusted by Governments, Defence and Critical Industries

Dassault Aviation
EDF
Naval group

Already adopted by ministries, defence agencies, financial institutions, and critical industries, Tixeo has become the strategic choice for organisations wanting to secure their most sensitive communications – without compromising on sovereignty.

Staying the course in uncertain times

Amid rising geopolitical tensions, escalating cyberthreats, and renewed focus on digital sovereignty, selecting a communications platform is no longer a technical afterthought – and “cloud-only” is no longer the only viable model.

The end of Skype for Business Server support presents a timely opportunity to rethink your communications infrastructure to:

  • Strengthen your cybersecurity posture,
  • Regain control over your data,
  • Ensure long-term digital autonomy.

For over two decades, Tixeo has embodied this vision – offering a sovereign, robust, and trusted solution.

End-to-end encryption, guaranteeing digital sovereignty

End-to-end encryption, guaranteeing digital sovereignty

OPINION – By Renaud Ghia, President of Tixeo


The end of end-to-end encryption: a threat to communication security

The widespread use of digital collaboration tools, particularly video conferencing, has become firmly embedded in corporate practices. This shift has been accompanied by greater awareness of the need to protect the confidentiality of shared information, placing end-to-end encryption at the heart of online meeting security concerns.

In a context marked by geopolitical tensions and economic crises, the fight against industrial espionage remains a top priority for European businesses. End-to-end encryption is currently the only genuine safeguard against eavesdropping on communications. It is therefore vital to clarify exactly what this mechanism entails, as its definition continues to be misused or distorted by certain industry players.

Fighting industrial espionage requires genuine end-to-end encryption

End-to-end encryption in video conferencing is a method of transmitting data (video, audio, data) which ensures that only the sender and the intended recipient(s) can decrypt the content, with no decryption taking place at any point in between. It must prevent any eavesdropping, including by telecommunications providers, internet service providers, and even the video conferencing solution provider itself. No one should have access to the encryption keys required to decrypt the conversation.

However, many video conferencing providers claim to offer end-to-end encryption when, in reality, they only encrypt the data flows between the user and the communication server. This means they can easily access the unencrypted data when it passes through their servers. Furthermore, most of these providers are subject to foreign laws requiring them to hand over users’ encryption keys upon request from the authorities. Under such conditions, the actual level of security is far below the claims made.

In France, reliable solutions exist that provide effective protection against espionage attempts. Organisations such as ANSSI (the French National Cybersecurity Agency) can guide businesses in making the right choice. Opting for a video conferencing solution with ANSSI-certified end-to-end encryption guarantees a trustworthy and highly secure service.

Sovereignty and digital independence: a growing imperative

Choosing a truly sovereign end-to-end encryption solution is essential to preserving the strategic autonomy of French and European stakeholders.

For France and Europe, such a choice is directly tied to the digital sovereignty of our industries and economies. It is now vital to take a European approach when building a digital ecosystem. Technology, R&D, support, and, crucially, hosting should be developed and consumed locally to avoid dependency on non-European powers — as recommended by European cybersecurity directives.

Yet foreign influences remain strong and continue to exert pressure…

On 28 January 2025, the French Senate passed an amendment requiring encrypted messaging providers to create privileged access to content exchanged on their platforms for French intelligence services, under penalty of a fine. This “privileged access” is nothing less than a breach in communication security. The creation of such backdoors in messaging systems serves only to weaken the protection of sensitive communications, while criminals will inevitably find alternative channels to continue their exchanges.

Act now to protect French and European industry

While the stated goal of combating terrorism and crime is commendable, the measures proposed against end-to-end encryption could have serious consequences for individual freedoms, freedom of expression, economic competitiveness, and, more broadly, the independence and digital sovereignty of a state.

With backdoors built into software, organisations would lose all guarantees of protection for their critical communications, and user trust would be severely undermined. Another risk is that businesses may turn to non-French or non-European encrypted solutions, which are not bound by protective regulations such as the GDPR.

It is worth recalling that in February 2024, the Court of Justice of the European Union ruled that any action aimed at weakening encryption would be contrary to EU law. Nevertheless, 32 EU countries, including France, have expressed support for ending end-to-end encryption. This comes at a time when the EU’s NIS 2 Directive is urging sensitive organisations to strengthen their cybersecurity. The passing of this amendment in France could therefore hinder innovation and the development of the only technology capable of guaranteeing the highest level of confidentiality for sensitive and secret communications relating to national interests.

To avoid exposing French industry ever more to the plundering of its data, regulators and lawmakers must strike a balance between protecting national security and addressing the urgent need to strengthen the cybersecurity and sovereignty of organisations.

Learn more about Tixeo’s technological independence