Software as a Service (SaaS)
Our software is delivered under a SaaS-Software as a Service model.
The set of services including identification, authentication, certificates life cycle management and electronic signature, make our eID software the ultimate solution for digital identification and electronic signatures in your organization.
Easy to integrate
Our software is intended for developers.
Because it is built as an API, integration with your channels and processes is extremely simple.
There is an extensive documentation within the dashboard that allows your development team to integrate any service and test it on the fly.
Easy to use Electronic Signature
Usability and ergonomics are the basis of our way of thinking and seeing the world.
The Digital Signature can be made from any Internet-connected device, anytime, anywhere. No need to install additional components, widgets, software, plugins, apps. We just need our device.
Thus, our technology can be implemented in a 98.56% of the current technology park.
Intelligent design and proper use of infrastructure and services available on Amazon Web Services (AWS) have allowed us to create a robust, secure and scalable architecture to deliver our services.
For our standard service model, independent and easily scalable instances for each customer are created.
For the corporate model, where the needs are more specific and may require disparate designs, our software is deployed as an Amazon Machine Image (AMI). This configuration allows each customer the complete freedom to design his own solution to suit his needs and security requirements.
Highest security level
Security and legal compliance are the two priorities in the design of our software.
|The logical and physical security of the architecture relies on a robust design and implementation, performed by security experts. Additionally, a penetration test is performed to update and mitigate potential security risks|
|Audit on best practices OWASP- Open Web Application Security Project ensures a safe, quality code.|
|The certificate management is entrusted to the most secure operating system known.|
|Best practices for management are audited by a third party under ETSI TS 101 456.|
|Maximum level of encryption.|
|Our secure signature creation devices meet the most demanding security regulations: the corporate version of our services has been certified under leading security standards including: