Welcome

Welcome to WisePlant - A WiseGroup Company Ir a: OTConnect (News & Blog) | WiseCourses Campus | Training courses | Technical support Language: EnglishportugueseEspañolGerman

SecureCloud is the name we adopted in WiseGroup to refer to our document, information and file management system, available to employees, business partners, integrators, customers, and suppliers. 100% digital and based on exclusive leading technologies makes our activities much safer and more productive. We promote a supply and service chain based on secure technologies, connections and processes with a limited number of users. Access to data and information is limited only to authorized users and all activities are traceable.

The digital contents are classified according to our information security policy. From a single place and with a single user and password you will have access to all the applications and information you need.

Privacy and Confidentiality

All information that arrives and leaves WisePlant is classified according to the Information Confidentiality Policy. In this way we make sure to protect the privacy of the data as well as the confidentiality of the contents. Not only in the flows of exchange of information but also in its archive and protection measures.

Encryption from Point to Point

According to the classification of the information, it is exchanged and managed with different security levels, both for its exchange and for its archiving. Digital signatures, access control rules, use control and storage mechanisms provide personalized security information.

Meets the Requirements of UETA / ESIGN

SecureCloud complies with the UETA, ESIGN and GDPR standards and complies with the strictest document signing policies in the United States of America and European trade unions. Developed with Anti-Tamper technology, digital signatures, bar code generation of your fingerprint, event log with date and time stamping, and other functionalities that allow you to use the system for auditing purposes.

Easy to Use - Based on Roles

The criteria used in the design of applications and the use of the best working tools allow users to access content quickly and safely, taking care of Privacy and Confidentiality. The security measures are configured for each user, project, and content as the information is classified.

FAQs

Why register?

As you must have already observed, a lot of information is available and accessible without registering. Then, why register?

After registering you will be included in a community of users in which you can communicate with other members who speak your language and share similar interests. You can get useful specific recommendations, and access a large amount of reserved information that only appears visible to registered users.

Based on roles, registered users will have multiple possibilities to access exclusive information, not available anonymously, create consultation cases, manage their purchases, participate in projects and many other activities.

Who can register?

Any visitor can register in WisePlant.com. The system will automatically assign you a registered visitor profile and your privileges will be those of a "basic subscriber". Other profiles are available that are assigned by the administration.

How should you register?

Visitors or interested have the following options to register:

  1. Entering with an active account in any of the social networks offered (currently Amazon, Facebook, LinkedIn, or Microsoft). These will be professional accounts as individuals but they will not be able to be associated with the information of the companies.
  2. Completing the Registration form by entering the basic data (It can be a professional personal account or corporate account for the company in which you work)
  3. You can ask us to generate the user account for you by sending us an application through some means of communication.
  4. Your account can be created to fulfill a supply, service, contract, etc. You will receive a Link or Invitation with admission instructions.

Can you register or login with more than one User Account?

Yes. You can create and log in to the system with more than one User account.

Personal / Social / Professional User Account: this user account will remain with you always, regardless of the company for which you work or are linked. Typically you will use your profiles on social networks, such as: LinkedIn, Amazon, Facebook, Microsoft or others. As long as your email account in each of your social accounts is the same, the system automatically detects it and will maintain profile settings, access privileges, history of your comments, etc. linked.

User Account Company / Labor / Professional: to create this account you must use the email account of the company for which you work. You will not be able to access information and specific content related to your role in a certain company with free email accounts or social profiles.

Important: Each of your accounts will be subject to identity validation, updating passwords with validity time, double validation factor, security questions, personal and work digital keys and other security mechanisms that will be related to the type of information and contents enabled in each of your user profiles.

What are digital, electronic and digital signatures?

The digital signatures they are a cryptographic mechanism by means of which the recipient of a "message" can verify the entity generating the content, which is usually known as authentication of origin and not repudiation), and confirm that the message has not been altered since it was signed by its originator, called integrity.

La Electronic signature it is a legal concept, electronic equivalent to that of the handwritten signature, where a person accepts the content of an electronic message through any valid electronic means. Examples: using a biometric signature, signing with an electronic pen when using a credit or debit card in a store, ticking a box on a computer, typing or using the mouse or finger on a touch screen, using a signature digital, using username and password, using a coordinate card.

La digitized signature is a type of signature that allows the signer to be identified in an electronic document including the graphic aspect of the handwritten signature.

From WiseGroup We use different types of signatures and digital certificates for administrative purposes and industrial systems for your cyber security. For all these cases there are different techniques, methods and technologies.

What are the digital certificates?

A digital certificate or electronic certificate is a computer file electronically signed by a certification service provider, considered by other entities as an authority for this type of content, which links some signature verification data to a signer, so that it can only Sign this signer, and confirm your identity. It has a data structure that contains information about the entity (for example, a public key, an identity or a set of privileges). The signature of the data structure groups the information it contains so that it can not be modified without this modification being detected.

There are different types of certificates depending on their use and purpose as well as different certification authorities. One of the many types of certificates are the SSL Certificates used to encrypt a visitor's communications on a Web page. Other types of certificates are generated by Bedrock Automation for the parts of its OSA universal control systems (Open & Secure Automation, with its patented BlackFabric technology CyberShield).

There are many formats for the creation of digital certificates. Among the best known we can mention X.509, SPKI, PGP, SAML, and many others.

What is Anti-Tamper technology?

Used in contractual documents, a unique document ID means that each contract or agreement that is created developed in the SecureCloud receives a unique document identifier (or ID). Similar to human DNA, each generated document has its own unique DNA chain. The identifier of the document is the text and the numerical string that identifies the unique DNA (unique in its class) of the document. If the document is manipulated or altered in some way (this means decrypting the database and changing something as small as a period to a comma within an electronic signature agreement of SecureCloud), the ID of the document will change immediately. Tampering with any aspect of a live agreement will literally make the agreement "self-destruct" until all the original content is exactly as it was at the time of signing. This additional security protects you and your signers and ensures that the terms of a document at the time of signing remain the same throughout the life cycle of the agreement period. This characteristic of resistance to manipulation is possible with the DNA of the document and the chain of document ID. It is also important to keep in mind that the document ID is never stored in the database, but is generated on demand each time a document is loaded so that it can not be modified and used for future agreements.

What is a Barcode of your Digital Signature?

The fingerprint is one of the most important characteristics for an audit! Similar to a human fingerprint, each signer of a document generated within the SecureCloud will have a unique fingerprint. The fingerprint consists of a series of events and data associated with the digital signature of the signatory party that was used to electronically sign your document. Once a document has been signed, a bar code is generated in the Audit Log of SecureCloud. The fingerprint barcode contains the unique checksum ID (which is a combination of numeric string and text) that constitutes the fingerprint of the signers' sole signature. It is important to keep in mind that the fingerprint (for security reasons) is NOT stored in the database of your website. SecureCloud. The fingerprint is generated each time a document is loaded. This helps protect the creator of the document, as well as its signer, from any malicious attempt to manipulate the terms of an electronically signed contract.
If you have access to a smartphone or tablet, you can search your app store for any number of free barcode readers. With an installed barcode reader application, you can scan the fingerprint identification. Scanning the barcode must return the text and the numerical value of the fingerprint (on your smartphone or tablet) as printed on the audit log.
If the multifactorial checksum fingerprint in your document does not match the text and the numeric string that is returned when you scan the barcode, you may have reason to suspect the authenticity of the document. The results of the scanned barcode of the electronic signature of SecureCloud they must match the same fingerprint check sum that is generated in your document.

How to create a digital certificate for personal use?

From WiseGroup we use two types of digital certificates for the exchange of information in a secure way among collaborators, customers and suppliers. These are X.509 I OpenPGP. Digital certificates to be used by people can be obtained from various certification authorities (CA, Certification Authorities) and in various ways. The certification authorities to stop the case of people, without good may vary slightly between them, validate a set of personal data (Name, e-mail, company, location).

Your company must have access to a service of digital signatures or management of digital certificates that will be granted by a certification authority. The integrators of certified systems of WiseGroup they will have access to an exclusive training and professional certification program that will allow them to develop the knowledge and skills necessary to implement cyber security in their engineering processes, industrial automation solutions and information management.

What uses can a personal digital signature or certificate have?

The answer is quite simple, for Security. Digital signatures have a very wide use in the market and we believe that the domain of security will be indispensable to develop almost any type of activity in the very near future. Digital signatures are more typically used to:

  1. Validate the identity of the issuer,
  2. Validate that the content, message or document was not modified,
  3. Encrypt the contents of messages exchanged by two or more users,
  4. Protect documents with encryption mechanisms
  5. Among other uses and applications.

On the other hand, two or more users exchange public digital certificates and keep their private digital certificates secure, allowing the exchange of messages in a completely secure manner.

Is the use of a digital signature or certificate enough to be safe?

The answer is quite simple, No. Safety must be incorporated into an organization in your culture, from top management downwards and in all your processes. Little will a person using a digital form contribute to satisfy the exchange of confidential documents with their client if they do not manage, manage and protect them in an appropriate way. The new regulations and regulations designed to protect critical infrastructures will fall with varied requirements for users and their suppliers. In many countries, they are already making important progress.

For many providers, not understanding and mastering security will keep them away from important clients. We are already seeing it with very simple examples of everyday life. For example: Web sites with SSL security certificates, new privacy and personal data protection policies, new technologies for industrial systems with embedded cybersecurity, industrial cybersecurity standards ANSI/ ISA99 / IEC-62443, and many other initiatives. In a couple of years we will be immersed in a complete new scenario, a scenario that is approaching very quickly!