Security, Confidentiality, Sovereignty

Wimi Armored has unique assets for managing and sharing your sensitive data and projects

End-to-end encryption

Multi-factor and device authentication

Data sovereignty

SaaS , Hybrid, On-Premise

SSO / Company Directory

End-to-end encryption

Your data is encrypted from your device (computer, mobile, tablet) and decrypted only transit the web while remaining perfectly indecipherable.

Proven technologies

All the security technologies used in Wimi Armored are based on proven and verified cryptography rules (eg Elliptic Curve Cryptography, private, public, ephemeral keys, TrustchainTM, …)

Privacy by Design and Security by Design.

Wimi Armored is one of the first solutions to apply the principles of Privacy and Security by Design.

Principles of end-to-end encryption

All data (messages, files, tasks, metadata, …) present on Wimi Armored are encrypted and decrypted locally by an authorized user and device. They are confusedly routed and stored on our servers, rendering them useless for intruders.

A TrustChain, an unalterable log

Each Wimi Armored account has its own TrustchainTM, an immutable log of all actions on your data.

Auth. multi-factor and multi-device

Secure access to your sensitive data by choosing your specific authentication criteria.

Define the authentication factors for your users

Wimi Armored allows you to define the authentication factors that your users must respect to connect. The possible options are: presence of an NFC field, Blutooth, IP range, time slot, biometric identifiers.

Your phone as an authentication device (optional)

Rather than a USB key or other device that is easily misplaced, Wimi Armored offers authentication via your mobile phone. You will need to scan a QR code present on the web login page of your Wimi Armored account and fill in the necessary authentication criteria (eg biometric fingerprint), then you will be logged in.

Password theft

Multifactor and multi-device authentication provides high protection against password theft because a password is not sufficient to connect to Wimi Armored.

Theft or loss of device

From the Wimi Armored interface, you can simply ban a device that you have lost or stolen.

Data sovereignty

Wimi is a 100% French company not subject to the US Patriot Act. In SaaS mode, accommodation is provided by a French host and physically located in metropolitan France.

Data stored on French soil

Data centers hosting Wimi Armored (in SaaS mode) are located in metropolitan France. These datacenters benefit from numerous certifications and quasi-military physical access security.

French host

In addition, the company that owns and manages these data centers is French.

Wimi Armored, 100% French solution

The Wimi Armored solution is developed by teams located in Paris and Sophia-Antipolis. Our technology partners are exclusively national players.

Independent company

Wimi Armored is published by Cloud Solutions SAS, a French and independent company.

SaaS, Hybride, On-Premise

Choose the web hosting that suits your organization!
Data is secure, encrypted and tamper proof

SaaS hosting

This is the most immediate and easy way of hosting. It only takes a few seconds for your Wimi Armored account to become operational.

Hybrid hosting

If you want your data to be placed on dedicated servers, we offer a corresponding hosting formula. In addition, we manage / monitor your instance for you.

On-premise hosting

Your security policy requires that your applications be hosted on your servers. Wimi Armored can be deployed also “On-premise”.

SSO / Company Directory

Enjoy integration with existing user profiles on your corporate directory.

Retrieving existing user profiles

Wimi Armored offers integration with enterprise directories via the SAML V2 protocol. This makes it possible to avoid duplication of user profiles.

Simplified user management

By using existing user profiles, you greatly facilitate the management of users of your Wimi Armored account. A disabled user from your directory will no longer be able to log into your Wimi Armored account.

Easy deployment

Using SSO, deployment of the Wimi Armored application is greatly facilitated.

More than 55,000 organizations trust us!

Why not you?