Teams | Collaboration | Customer Service | Project Management

Rocket.Chat 2025 Recap

Before we get too far into 2026, we’re taking a moment to reflect on what brought us here: the commitment to show up, connect, and build together. This video highlights the moments and achievements that shaped our 2025 — and the collaboration that made them possible. As we continue building ahead, let’s keep dreaming, owning, trusting, and sharing in 2026. Interested in joining us in the future?

From Slack to sovereign platforms: a guide for European government

European government agencies face critical compliance challenges using cloud-hosted Slack due to US CLOUD Act jurisdiction over data controlled by American platforms. The key distinction: the issue is not the software itself, but who controls the data. This guide defines what a sovereign communication platform is, presents the leading compliant alternatives: Rocket.Chat, Mattermost, and Element.

Rocket.Chat + Pexip: Integrated Secure Comms for Government

Standard IT tools weren't built for high-security environments—or for connecting seamlessly with mission partners across complex networks. In this session, experts from Rocket.Chat and Pexip explore how Federal Systems Integrators (FSIs) and defense agencies are modernizing collaboration without compromising on security. What you’ll learn in this webinar: Standard IT tools often trap data in silos, slowing down critical decision-making. We discuss how to move from legacy systems to air-gapped, mission-ready solutions that ensure total data sovereignty.

Rocket.Chat 8.0: Intelligent, Connected and Secure by default

Rocket.Chat is built for organizations that require secure, sovereign and resilient collaboration under continuous governance. Rocket.Chat 8.0 expands that foundation with workspace federation, attribute-based access controls (ABAC), integrated voice escalation, and intelligent search. In environments where security, governance, and operational continuity are non-negotiable, collaboration cannot rely on a model in which access, context, and boundaries are configured ahead of time.