Casper™ Cloaking Technology

Casper™ Cloaking Technology by Designtex is an architectural film for glass walls that obscures digital screens to outside view. It acts as a smart shield to ensure data privacy, while providing the peace of mind to collaborate freely in any working environment. This is a breakthrough that will unleash space design in the networked modern world. Casper™ is the only cloaking technology of its kind anywhere. You have to see it to believe it.

Privacy as Standard.

It’s the perfect confidentiality cloak, obscuring only the light transmitted by large LED displays.

Anyone looking into the room from the outside sees just a black screen, while everyone in the room can work freely with peace of mind.

LED displays filter specific light oscillations.

By selectively filtering them again, Casper™ renders the display light invisible.

Promo Video

Casper Cloaking Technology Promo Video from Protective Film Solutions EU on Vimeo.

See more

New TC7.3 is out

New features:
• Bring SX80, MX700/800 up to parity of C-Series in terms of features for easy adaptation
• Web snapshots: Warn user when snapshots are being taken
• SX80: Dual presentation outside call
• Faster software upgrade from web
• SX20 new OSD for passive mode (when using Touch)
• SpeakerTrack 60: Snap to whiteboard.
• Historical log bundles will include (anonymized) call history by default.
Bug fixes

• Fix for the POODLE Vulnerability (CSCur23723)
• Touch 8 may drop the endpoint network pairing (CSCup89614)
• Need command to disable CDP (CSCub26258)

Please read the release notes and download it her.

The Heartbleed Bug


The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

The HeartbleedBug and Cisco 


OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products

Multiple Cisco products incorporate a version of the OpenSSL package affected by a vulnerability that could allow an unauthenticated, remote attacker to retrieve memory in chunks of 64 kilobytes from a connected client or server.

The vulnerability is due to a missing bounds check in the handling of the Transport Layer Security (TLS) heartbeat extension. An attacker could exploit this vulnerability by implementing a malicious TLS or Datagram Transport Layer Security (DTLS) client, if trying to exploit the vulnerability on an affected server, or a malicious TLS or DTLS server, if trying to exploit the vulnerability on an affected client. An exploit could send a specially crafted TLS or DTLS heartbeat packet to the connected client or server. An exploit could allow the attacker to disclose a limited portion of memory from a connected client or server for every heartbeat packet sent. The disclosed portions of memory could contain sensitive information that may include private keys and passwords.

Please note that the devices that are affected by this vulnerability are the devices acting as an SSL server terminating SSL connections or devices acting as an SSL Client initiating an SSL connection. Devices that are simply traversed by SSL traffic without terminating it are not affected.

This advisory will be updated as additional information becomes available. Cisco will release free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities may be available. This advisory is available at the following link:


The following Cisco products have been analyzed and are not affected by this vulnerability:

  • Cisco IP Video Phone E20
  • Cisco TelePresence MXP Series
  • Cisco TelePresence Advanced Media Gateway Series
  • Cisco TelePresence IP VCR Series
  • Cisco TelePresence MCU all series


The following Cisco products are currently under investigation:

  • Cisco TelePresence Movi with Precision HD USB / Jabber Video
  • Cisco TelePresence Recording Server
  • Tandberg 770/880/990 Series Tandberg
  • Codian ISDN GW 3210/3220/3240
  • Tandberg Codian MSE 8310 model


Vulnerable TelePresence Products to Heartbleed




  • Cisco Unified Communications Manager (UCM) 10.0 [CSCuo17440]
  • Cisco TelePresence Video Communication Server (VCS) [CSCuo16472]
  • Cisco Expressway Series [CSCuo16472]
  • Cisco TelePresence Conductor [CSCuo20306]
  • Cisco TelePresence IP Gateway Series [CSCuo21597]
  • Cisco TelePresence ISDN GW 3241 [CSCuo21486]
  • Cisco TelePresence ISDN GW MSE 8321 [CSCuo21486]
  • Cisco TelePresence ISDN Link [CSCuo26686]
  • Cisco TelePresence Serial Gateway Series [CSCuo21535]
  • Cisco TelePresence Server 8710, 7010 [CSCuo21468]
  • Cisco TelePresence Server on Multiparty Media 310, 320 [CSCuo21468]
  • Cisco TelePresence Server on Virtual Machine [CSCuo21468]
  • Cisco TelePresence Supervisor MSE 8050 [CSCuo21584]


Cisco Telepresence System Maintenance and cleaning

Profile, C, EX, SX, MX,


Vacuum cleaning


After any vacuum cleaning of the room, verify that no power cables have been loosened.

[notice]Caution – The vacuum cleaner must never be connected to any of the PC power outlets of the table![/notice]



The screen should be cleaned using the screen cleaning cloth that comes with the system.


Camera Lens

Do not touch the camera after installation is completed. If you need to clean the camera lens, use a dry microfiber cloth. After cleaning, you will need to realign the camera.


Main video display

The screens should be cleaned using the glass cleaning and the microfiber cloth


System enclosures

Clean with a detergent made for glass cleaning and the microfiber cloth. Apply the detergent to the cloth only. Do not spray directly on the system.



On TX9000 you also need


Maintaining the Tabletop


[notice]Caution – Waxing or rubbing the surface with any type of abrasive is not recommended.[/notice]


  • For general daily care – use a dampened cloth with clean water.
  • To remove dirt – use a mild soap and water solution. Wipe off with clean water afterward to removethe soap.
  • To remove ink marks – rub the stained area with a pencil eraser.
  • To polish the tabletop – use lemon oil.


[notice]Note – Lemon oil is not recommended for daily use.[/notice]


Cleaning the Displays

Wipe the panel surface gently using only a cleaning cloth or a soft, lint-free cloth. If the surface is particularly dirty, wipe with a soft, lint-free cloth which has been soaked in pure water or water to whicha small amount of neutral detergent has been added, and then wipe it evenly with a dry cloth of the same type until the surface is dry.


Cleaning the Camera Lens

[notice]Caution Do not touch the camera after installation is completed.[/notice]

If you need to clean the camera lens, use a dry microfiber cloth. After cleaning, you will need to realign the camera.


Cleaning the system

Use a clean, soft cloth with warm water and mild soap to remove any marks on your Cisco TelePresence white speaker screens.


[notice]Caution – Using anything other than a soft cloth, warm water and mild soap may permanently damage the display screen.[/notice]

Replac ing fluids and cloths

Whenever needed, the microfibre cleaning cloth should be replaced by a microfibre cloth designed for glass cleaning.

Screen cleaning kit should be replaced by 3M Screen and Keyboard Cleaner.


Tabletops in other finish what maple- or walnut-finish in your TX9000 room?

Can´t you sell TX9000 to you’re customers do to that they don´t like maple- or walnut-finish tables? Does it not match to the client’s interior designer, or their corporate design lines?


I had a customer there was building a completely new HQ building in Copenhagen, and their interior designers only wood choice was oak to all types of interior in the new HQ building.

On the same time they installed TX9000 in the first 3 sites, in a worldwide implementation and of course one of the rooms was in this new HQ building. So the interior designers were all over the worldwide implementation of TX9000 and made a separate design guide for TX9000 room’s whit oak as the only option, for all the rooms worldwide, to get the same field and touch in all rooms.

We used a lot of time to tell that the only option from Cisco is maple- or walnut-finish. If we could not deliver them, they want to have them made specialty from a local contractor so they need some measurements of the Tabletops and they will then install them after the room was finalized from Cisco AS.

We call the BU to get the measurements of the tabletops, they asked of course way we need that information. We told them about the customer, and they suggested us instead to try to contact Cisco´s supplier of the tabletops.

The supplier is Woodtech in Oakland, California and the customer made a connection to med CEO of woodtech and they now buy their tabletops direct form the same supplier as Cisco.

See more about Woodtech

We got Cisco AS to install new tabletops as part of the installation on the customer sites. But you still have to buy a maple- or walnut-finish tabletop from Cisco but you can just install the new instead or alternative after Cisco AS has finalized the room. And the TX9000 also looks really good, whit an oak tabletop.


This solution is not support from Cisco it is a work a round[/notice]