Welcome to WisePlant - A WiseGroup Company  - | -   SpanishEnglishPortuguese    - | -   Facebook   Twitter  Instagram   Tumblr   Telegram   Reddit  - | -

No session

*** You are not logged in to the SecureCloud ***

SecureCloud is the name we adopt in WiseGroup to refer to our document, information and file management system, available to employees, business partners, integrators, customers, and suppliers. 100% digital and based on exclusive leading technologies makes our activities much safer and more productive. We promote a supply and service chain based on secure technologies, connections and processes with a limited number of users. Access to data and information is limited only to authorized users and all activities are traceable.

The digital contents are classified according to our information security policy. From a single place and with a single user and password you will have access to all the applications and information you need.

Multiple applications from one placeExclusive Community of Professionals


  • Registration: Ok
  • Verification: Ok
  • Profiles: Ok


  • Profile: Ok
  • Experience: Ok


  • Invitation: Ok
  • Acceptance: Ok
  • Administration: Ok


  • Online: Ok
  • Offline: Ok


  • Price Lists: Ok
  • Quotes: Ok
  • Purchase Orders: Ok
  • Billing: Ok


  • Payment Platform: Ok
  • Multiple forms of Payment: Ok


  • Comments: Ok
  • Reactions: Ok
  • Conversations: Ok
  • Experiences: Ok


  • Members: Ok
  • Thematic: Ok
  • Private: Ok
  • Confidential: Ok
  • Closed: Ok


  • Courses: Ok
  • Members: In development.
  • Visitors: In development.


  • Courses: Ok
  • Certifications: Ok
  • Points: Ok
  • CEU credits: In development

Social Networks

  • Several: Ok


  • OT Connect: Ok
  • Newsletter: Ok
  • Digest: Ok


Advanced configuration of profiles, permissions, actions, accesses, and mechanisms for the prevention of attacks, and other actions. Our mission is to maintain a community of high-level, small, and exclusive professionals.

VIP contents

  • Classification: Ok
  • Accesses: Ok
  • Security: Ok

Digital Library

  • Documents: Ok
  • Videos: Ok
  • Photos: Ok


  • Microsoft 365: Ok


  • Seminars: Ok
  • Courses: Ok
  • On demand: In Development

Technical support

  • Basic x Chat: Ok
  • Tickets: Ok
  • Contracts: Ok


Why register?

As you must have already observed, a lot of information is available and accessible without registering. Then, why register? 

After registering you will be included in a community of users in which you can communicate with other members who speak your language and share similar interests. You can get useful specific recommendations, and access a large amount of reserved information that only appears visible to registered users.

Based on roles, registered users will have multiple possibilities to access exclusive information, not available anonymously, create consultation cases, manage their purchases, participate in projects and many other activities.

Who can register?

Any visitor can register at WisePlant.com. The system will automatically assign you a registered visitor profile and your privileges will be those of a “basic subscriber”. Other profiles are available that are assigned by the administration.

How should you register?

Visitors or interested have the following options to register:

  1. Entering with an active account in any of the social networks offered (currently Amazon, Facebook, LinkedIn, or Microsoft). These will be professional accounts as individuals but they will not be able to be associated with the information of the companies.
  2. Completing the Registration form by entering the basic data (It can be a professional personal account or corporate account for the company in which you work)
  3. You can ask us to generate the user account for you by sending us an application through some means of communication.
  4. Your account can be created to fulfill a supply, service, contract, etc. You will receive a Link or Invitation with admission instructions.

Can you register or login with more than one User Account?

Yes. You can create and log in to the system with more than one User account.

Personal / Social / Professional User Account: this user account will remain with you always, regardless of the company for which you work or are linked. Typically you will use your profiles on social networks, such as: LinkedIn, Amazon, Facebook, Microsoft or others. As long as your email account in each of your social accounts is the same, the system automatically detects it and will maintain profile settings, access privileges, history of your comments, etc. linked.

User Account Company / Labor / Professional: to create this account you must use the email account of the company for which you work. You will not be able to access information and specific content related to your role in a certain company with free email accounts or social profiles.

Important: Each of your accounts will be subject to identity validation, updating passwords with validity time, double validation factor, security questions, personal and work digital keys and other security mechanisms that will be related to the type of information and contents enabled in each of your user profiles.

What are digital, electronic and digital signatures?

Companies that digital signatures they are a cryptographic mechanism by means of which the recipient of a "message" can verify the entity generating the content, which is usually known as authentication of origin and not repudiation), and confirm that the message has not been altered since it was signed by its originator, called integrity.

La Electronic signature it is a legal concept, electronic equivalent to that of the handwritten signature, where a person accepts the content of an electronic message through any valid electronic means. Examples: using a biometric signature, signing with an electronic pen when using a credit or debit card in a store, ticking a box on a computer, typing or using the mouse or finger on a touch screen, using a signature digital, using username and password, using a coordinate card.

La digitized signature is a type of signature that allows the signer to be identified in an electronic document including the graphic aspect of the handwritten signature.

From WiseGroup we make use of different types of digital signatures and certificates for administrative purposes and industrial systems for your cyber security. For all these cases there are different techniques, methods and technologies.

What are the digital certificates?

A digital certificate or electronic certificate is a computer file electronically signed by a certification service provider, considered by other entities as an authority for this type of content, which links some signature verification data to a signer, so that it can only Sign this signer, and confirm your identity. It has a data structure that contains information about the entity (for example, a public key, an identity or a set of privileges). The signature of the data structure groups the information it contains so that it can not be modified without this modification being detected.

There are different types of certificates depending on their use and purpose, as well as different certification authorities. One of the many types of certificates are SSL Certificates used to encrypt the communications of a visitor on a Web page. Other types of certificates are generated by Bedrock Automation for the parts of its universal control systems OSA (Open & Secure Automation, with its patented BlackFabric CyberShield technology).

There are many formats for the creation of digital certificates. Among the best known we can mention X.509, SPKI, PGP, SAML, and many others.

What is Anti-Tamper technology?

Used in contractual documents, a unique document ID means that each contract or agreement that is created developed in the SecureCloud receives a unique document identifier (or ID). Similar to human DNA, each generated document has its own unique DNA strand. The document identifier is the text and numeric string that identifies the unique DNA (one of a kind) of the document. If the document is tampered with or altered in any way (this means decrypting the database and changing something as small as a period to a comma within a SecureCloud electronic signature agreement), the ID of the document will change immediately. Altering any aspect of a live agreement will literally cause the agreement to “self-destruct” until all original content is exactly as it was at the time of signing. This added security protects you and your signers and ensures that the terms of a document at the time of signing remain the same throughout the life cycle of the agreement period. This tamper resistance feature is possible with the document DNA and the document ID string. It is also important to note that the document ID is never stored in the database, but is generated on demand each time a document is uploaded so that it cannot be modified and used for future deals.

What is a Barcode of your Digital Signature?

The fingerprint is one of the most important characteristics for an audit! Similar to a human fingerprint, each signer of a document generated within the SecureCloud will have a unique fingerprint. The fingerprint consists of a series of events and data associated with the digital signature of the signatory party that was used to electronically sign your document. Once a document has been signed, a barcode is generated in the SecureCloud Audit Log. The fingerprint bar code contains the unique checksum ID (which is a combination of numeric string and text) that constitutes the fingerprint of the signers' sole signature. It is important to keep in mind that the fingerprint (for security reasons) is NOT stored in the database of your SecureCloud website. The fingerprint is generated each time a document is loaded. This helps protect the creator of the document, as well as its signer, from any malicious attempt to manipulate the terms of an electronically signed contract.
If you have access to a smartphone or tablet, you can search your app store for any number of free barcode readers. With an installed barcode reader application, you can scan the fingerprint identification. Scanning the barcode must return the text and the numerical value of the fingerprint (on your smartphone or tablet) as printed on the audit log.
If the multifactorial checksum fingerprint in your document does not match the text and the numeric string that is returned when you scan the barcode, you may have reason to suspect the authenticity of the document. The results of the scanned barcode of SecureCloud's electronic signature must match the same fingerprint check sum that is generated in your document.

How to create a digital certificate for personal use?

From WiseGroup we use two types of digital certificates for the exchange of information in a secure way among collaborators, customers and suppliers. These are X.509 I OpenPGP. Digital certificates to be used by people can be obtained from various certification authorities (CA, Certification Authorities) and in various ways. The certification authorities to stop the case of people, without good may vary slightly between them, validate a set of personal data (Name, e-mail, company, location).

Your company must have access to a digital signature service or management of digital certificates that will be granted by a certification authority. WiseGroup certified system integrators will be able to access an exclusive training and professional certification program that will allow them to develop the knowledge and competencies necessary to implement cyber security in their engineering processes, industrial automation solutions and information management.

What uses can a personal digital signature or certificate have?

The answer is quite simple, for Security. Digital signatures have a very wide use in the market and we believe that the domain of security will be indispensable to develop almost any type of activity in the very near future. Digital signatures are more typically used to:

  1. Validate the identity of the issuer,
  2. Validate that the content, message or document was not modified,
  3. Encrypt the contents of messages exchanged by two or more users,
  4. Protect documents with encryption mechanisms
  5. Among other uses and applications.

On the other hand, two or more users exchange public digital certificates and keep their private digital certificates secure, allowing the exchange of messages in a completely secure manner.

Is the use of a digital signature or certificate enough to be safe?

The answer is quite simple, No. Safety must be incorporated into an organization in your culture, from top management downwards and in all your processes. Little will a person using a digital form contribute to satisfy the exchange of confidential documents with their client if they do not manage, manage and protect them in an appropriate way. The new regulations and regulations designed to protect critical infrastructures will fall with varied requirements for users and their suppliers. In many countries, they are already making important progress.

For many providers, not understanding and mastering security will keep them away from important clients. We are already seeing it with very simple examples of everyday life. For example: Web sites with SSL security certificates, new privacy and personal data protection policies, new technologies for industrial systems with embedded cybersecurity, industrial cybersecurity standards ANSI / ISA99 / IEC-62443, and many other initiatives. In a couple of years we will be immersed in a complete new scenario, a scenario that is approaching very quickly!