Security, Confidentiality, Sovereignty
Wimi Armoured has unique assets for managing and sharing your sensitive data and projects
Wimi Armoured has unique assets for managing and sharing your sensitive data and projects
All the security technologies used in Wimi Armoured are based on proven and verified cryptography rules (eg Elliptic Curve Cryptography, private, public, ephemeral keys, TrustchainTM, …)
Wimi Armoured is one of the first solutions to apply the principles of Privacy and Security by Design.
All data (messages, files, tasks, metadata, …) present on Wimi Armoured are encrypted and decrypted locally by an authorized user and device. They are confusedly routed and stored on our servers, rendering them useless for intruders.
Each Wimi Armoured account has its own TrustchainTM, an immutable log of all actions on your data.
Wimi Armoured allows you to define the authentication factors that your users must respect to connect. The possible options are: presence of an NFC field, Blutooth, IP range, time slot, biometric identifiers.
Rather than a USB key or other device that is easily misplaced, Wimi Armoured offers authentication via your mobile phone. You will need to scan a QR code present on the web login page of your Wimi Armoured account and fill in the necessary authentication criteria (eg biometric fingerprint), then you will be logged in.
Multifactor and multi-device authentication provides high protection against password theft because a password is not sufficient to connect to Wimi Armoured.
From the Wimi Armoured interface, you can simply ban a device that you have lost or stolen.
Data centers hosting Wimi Armoured (in SaaS mode) are located in metropolitan France. These datacenters benefit from numerous certifications and quasi-military physical access security.
In addition, the company that owns and manages these data centers is French.
The Wimi Armoured solution is developed by teams located in Paris and Sophia-Antipolis. Our technology partners are exclusively national players.
Wimi Armoured is published by Cloud Solutions SAS, a French and independent company.
This is the most immediate and easy way of hosting. It only takes a few seconds for your Wimi Armoured account to become operational.
If you want your data to be placed on dedicated servers, we offer a corresponding hosting formula. In addition, we manage / monitor your instance for you.
Your security policy requires that your applications be hosted on your servers. Wimi Armoured can be deployed also “On-premise”.
Wimi Armoured offers integration with enterprise directories via the SAML V2 protocol. This makes it possible to avoid duplication of user profiles.
By using existing user profiles, you greatly facilitate the management of users of your Wimi Armoured account. A disabled user from your directory will no longer be able to log into your Wimi Armoured account.
Using SSO, deployment of the Wimi Armoured application is greatly facilitated.