A BREAKTHROUGH TECHNOLOGY

Shadline makes data invisible

to build secure digital spaces unexposed to cyber attacks

A GROWING REPUTATION

On going SECNUMCLOUD by the ANSSI

BCSIA 2018 Finalist

FIC 2019 Finalist

POWERFUL TECHNOLOGICAL ASSETS

FRAGMENTATION

A key asset of Shadline

Each file is divided into several segments which are encoded, encrypted and then duplicated on the different nodes of the storage infrastructure. The files no longer exist as an objects. In such a state the segments make it impossible to steal or alter the data.

ENCRYPTION

Data are secured and remain your property

The HTTPS transport tunnel helps but is not enough. At the application level, Shadline over-cyphers each of the web requests using a unique and temporary key. Symmetric and asymmetric encryption mechanisms based on proven protocols and algorithms (TLS 1.2, AES-256, RSA-3072, etc.) are used. Each company may possess its own key to encrypt all the data of its users.

CERTIFIED DATA CENTER

We ensure the best guarantee

Datacenters hosting the Shadline application infrastructure benefit from numerous certifications, including ISO 9001, ISO 22301, ISO 27001, HDS (Health Data Host) and are PCI DSS compliant.
The log storage infrastructure is dedicated and hosted by a third party.

AUDITABILITY

We make the bet of "fair" technology

Shadline relies on open-source systems and non-proprietary security mechanisms. Any network components, system, application and platform security can be audited by our customers. The servers are configured according to ANSSI, NIST, PCI DSS security standards, etc. A qualification process is underway with ANSSI, the French National Agency for Information Systems Security.

TRACEABILITY

Tailored and trusted logs

The event logs are lively replicated to a SIEM Shadline hosted on an infrastructure which is apart from the other components of Shadline. This system allows us to ensure traceability of access and use of Shad line’s services. Administration operations are performed by our dedicated technical teams.

AUTHENTICATION

Two-factor authentication

Shadline’s access requires an individual ID and a password. The rules that govern the choice of password go beyond the standard recommendations. Strong authentication can be activated simply (2nd OTP factor transmitted by SMS or email). The user’s password are never directly used by Shadline service nor stored.

IS INDEPENDANCE

You are protected from vulnerabilities and failures of your IS

Shadline is a SaaS solution. No access to your IT resources is required (no dependency on the corporate directory, email, etc.). Shadline guarantees the availability of your critical data and provides an effective communication tool, even if the company’s IS were to be unavailable.

DATA PROPERTY

You keep control of your information

All information sent, imported or stored on Shadline by the users remains their own property. The connection information collected are only used to ensure the proper functioning and use of the service. Data collection is made in accordance with the regulations in force (GDPR, etc.)

YOU WANT MORE?

Contact us

Contact us

DATA RESILIENCE - BUSINESS RESILIENCE