The eavesdropping of confidential conversations in conferences and meetings poses a significant threat to companies and governmental organizations; the potential and collateral damage that can result from the disclosure of research or negotiation results (f.e.) is threatening the existence of companies and results may negatively affect the market and stock exchange value.

Experience shows that a ban on mobile phones for meetings and negotiations is not an obstacle to recording and passing on information.

Small transmitters can be hidden almost everywhere, and the transmission ranges are almost unlimited: Disguised as a power outlet, electricity meter, lamp, light switch, computer mouse, pen, calculator, USB sticks, etc. or
bugging devices directly on the body, directional microphones, laser IR systems or microphones mounted on windows & facades, there is a huge range of threats.

In principle, a distinction must be made between two groups of perpetrators with regard to concealed eavesdropping devices: External perpetrators, e.g. visitors, business partners, service providers, couriers, etc. External perpetrators can be effectively prevented from smuggling in bugging devices by effective monitoring and access control.

Internal perpetrators, e.g. employees, maintenance technicians, cleaning staff, etc. are usually not subject to tightened access control and can therefore deposit and install bugging devices much more easily.

Unfortunately, many companies and authorities handle sensitive information carelessly. Without special equipment, no effective protection against intelligence services can be guaranteed, as they have professional eavesdropping devices and technology to carry out targeted (industrial) espionage. Unfortunately, many institutions only act after the occurrence of a damaging event – a foresighted and comprehensive eavesdropping defense planning is therefore essential in order to avoid greater damage.


unival provides professional eavesdropping protection measures for private and governmental clients for over 15 years. In addition to our professional counter-monitoring/ counter eavesdropping services, we offer comprehensive, multi-level and individually adapted eavesdropping defense concepts, which are guaranteed by the interlocking of the most modern and redundant eavesdropping defense technologies.

Furthermore, we consult and accompany our customers from the planning of the eavesdropping defense measures via the integration up to the training and danger sensitization. Through years of experience and optimization we offer a completely tap-proof protection concept, which is freely scalable from the individual conference room up to complete buildings.

Our comprehensive eavesdropping protection is conceptually illustrated by the following example:

1 | It is necessary to make the conference room completely tap-proof. This is guaranteed by various active and passive countermeasures inside the room.

2 | By inconspicuous and efficient screening of persons by different active and passive security systems, the smuggling in of listening- and recording devices is prevented.

3 | The entire area is continuously monitored actively from the security room through intelligent video analysis systems, in order to prevent the concealed installation of listening devices even outside company opening hours. Furthermore, during conversations the room is actively monitored by unival systems for suspicious transmission signals, which are directly detected, analyzed and disturbed.


Tap proof Conference Room