SecureCloud is the name we adopted in WiseGroup to refer to our document, information and file management system, available to employees, business partners, integrators, customers, and suppliers. 100% digital and based on exclusive leading technologies makes our activities much safer and more productive. We promote a supply and service chain based on secure technologies, connections and processes with a limited number of users. Access to data and information is limited only to authorized users and all activities are traceable.
The digital contents are classified according to our information security policy. From a single place and with a single user and password you will have access to all the applications and information you need.
Privacy and Confidentiality
All information that arrives and leaves WisePlant is classified according to the Information Confidentiality Policy. In this way we make sure to protect the privacy of the data as well as the confidentiality of the contents. Not only in the flows of exchange of information but also in its archive and protection measures.
Encryption from Point to Point
According to the classification of the information, it is exchanged and managed with different security levels, both for its exchange and for its archiving. Digital signatures, access control rules, use control and storage mechanisms provide personalized security information.
Meets the Requirements of UETA / ESIGN
SecureCloud complies with the UETA, ESIGN and GDPR standards and complies with the strictest document signing policies in the United States of America and European trade unions. Developed with Anti-Tamper technology, digital signatures, bar code generation of your fingerprint, event log with date and time stamping, and other functionalities that allow you to use the system for auditing purposes.
Easy to Use - Based on Roles
The criteria used in the design of applications and the use of the best working tools allow users to access content quickly and safely, taking care of Privacy and Confidentiality. The security measures are configured for each user, project, and content as the information is classified.
As you must have already observed, a lot of information is available and accessible without registering. Then, why register?
After registering you will be included in a community of users in which you can communicate with other members who speak your language and share similar interests. You can get useful specific recommendations, and access a large amount of reserved information that only appears visible to registered users.
Based on roles, registered users will have multiple possibilities to access exclusive information, not available anonymously, create consultation cases, manage their purchases, participate in projects and many other activities.
Who can register?
Any visitor can register in WisePlant is an independent division of WiseGroup dedicated to the distribution, sale and after-sales support of products and technological solutions of the factories represented. WisePlant also identifies the main brand of entrepreneurial group often used as the WisePlant Group..com. The system will automatically assign you a registered visitor profile and your privileges will be those of a "basic subscriber". Other profiles are available that are assigned by the administration.
How should you register?
Visitors or interested have the following options to register:
- Entering with an active account in any of the social networks offered (currently Amazon, Facebook, LinkedIn, or Microsoft). These will be professional accounts as individuals but they will not be able to be associated with the information of the companies.
- Completing the Registration form by entering the basic data (It can be a professional personal account or corporate account for the company in which you work)
- You can ask us to generate the user account for you by sending us an application through some means of communication.
- Your account can be created to fulfill a supply, service, contract, etc. You will receive a Link or Invitation with admission instructions.
Can you register or login with more than one User Account?
Yes. You can create and log in to the system with more than one User account.
Personal / Social / Professional User Account: this user account will remain with you always, regardless of the company for which you work or are linked. Typically you will use your profiles on social networks, such as: LinkedIn, Amazon, Facebook, Microsoft or others. As long as your email account in each of your social accounts is the same, the system automatically detects it and will maintain profile settings, access privileges, history of your comments, etc. linked.
User Account Company / Labor / Professional: to create this account you must use the email account of the company for which you work. You will not be able to access information and specific content related to your role in a certain company with free email accounts or social profiles.
Important: Each of your accounts will be subject to identity validation, updating passwords with validity time, double validation factor, security questions, personal and work digital keys and other security mechanisms that will be related to the type of information and contents enabled in each of your user profiles.
What are digital, electronic and digital signatures?
The digital signatures they are a cryptographic mechanism by means of which the recipient of a "message" can verify the entity generating the content, which is usually known as authentication of origin and not repudiation), and confirm that the message has not been altered since it was signed by its originator, called integrity.
La Electronic signature it is a legal concept, electronic equivalent to that of the handwritten signature, where a person accepts the content of an electronic message through any valid electronic means. Examples: using a biometric signature, signing with an electronic pen when using a credit or debit card in a store, ticking a box on a computer, typing or using the mouse or finger on a touch screen, using a signature digital, using username and password, using a coordinate card.
La digitized signature is a type of signature that allows the signer to be identified in an electronic document including the graphic aspect of the handwritten signature.
From WiseGroup identifies WisePlant SA, WisePlant Group LLC, WisePlant Group Corp, WiseSecurity SA Corporation, Mirellina LLC and the founding companies (XN, Urigo and H&S Group). It also includes business divisions (WiseSecurity, WiseCourses, WiseCities and WisePlant). For a question ... Learn more We use different types of signatures and digital certificates for administrative purposes and industrial systems for your cyber security. For all these cases there are different techniques, methods and technologies.
What are the digital certificates?
A digital certificate or electronic certificate is a computer file electronically signed by a certification service provider, considered by other entities as an authority for this type of content, which links some signature verification data to a signer, so that it can only Sign this signer, and confirm your identity. It has a data structure that contains information about the entity (for example, a public key, an identity or a set of privileges). The signature of the data structure groups the information it contains so that it can not be modified without this modification being detected.
There are different types of certificates depending on their use and purpose as well as different certification authorities. One of the many types of certificates are the SSL Certificates used to encrypt a visitor's communications on a Web page. Other types of certificates are generated by Bedrock Automation is an 100% subsidiary owned by MAXIM. MAXIM is a US manufacturer based in San José California, a leader in the design and manufacture of semiconductors for special applications and military-grade technology based on crypto-processors. MAXIM is worldwide c ... Learn more for the parts of its OSA universal control systems (Open & Secure Automation, with its patented BlackFabric technology The BlackFabric CyberShield 3.0 update is one of Bedrock Automation's most advanced developments since the launch of its secure and open platform. It consists of a set of more than 70 technologies patented by Bedrock Automation for Cybersecurity of industrial systems with ... Learn more).
What is Anti-Tamper technology?
What is a Barcode of your Digital Signature?
How to create a digital certificate for personal use?
From WiseGroup we use two types of digital certificates for the exchange of information in a secure way among collaborators, customers and suppliers. These are X.509 I OpenPGP. Digital certificates to be used by people can be obtained from various certification authorities (CA, Certification Authorities) and in various ways. The certification authorities to stop the case of people, without good may vary slightly between them, validate a set of personal data (Name, e-mail, company, location).
Your company must have access to a service of digital signatures or management of digital certificates that will be granted by a certification authority. The integrators of certified systems of WiseGroup identifies WisePlant SA, WisePlant Group LLC, WisePlant Group Corp, WiseSecurity SA Corporation, Mirellina LLC and the founding companies (XN, Urigo and H&S Group). It also includes business divisions (WiseSecurity, WiseCourses, WiseCities and WisePlant). For a question ... Learn more they will have access to an exclusive training and professional certification program that will allow them to develop the knowledge and skills necessary to implement cyber security in their engineering processes, industrial automation solutions and information management.
What uses can a personal digital signature or certificate have?
The answer is quite simple, for Security. Digital signatures have a very wide use in the market and we believe that the domain of security will be indispensable to develop almost any type of activity in the very near future. Digital signatures are more typically used to:
- Validate the identity of the issuer,
- Validate that the content, message or document was not modified,
- Encrypt the contents of messages exchanged by two or more users,
- Protect documents with encryption mechanisms
- Among other uses and applications.
On the other hand, two or more users exchange public digital certificates and keep their private digital certificates secure, allowing the exchange of messages in a completely secure manner.
Is the use of a digital signature or certificate enough to be safe?
The answer is quite simple, No. Safety must be incorporated into an organization in your culture, from top management downwards and in all your processes. Little will a person using a digital form contribute to satisfy the exchange of confidential documents with their client if they do not manage, manage and protect them in an appropriate way. The new regulations and regulations designed to protect critical infrastructures will fall with varied requirements for users and their suppliers. In many countries, they are already making important progress.
For many providers, not understanding and mastering security will keep them away from important clients. We are already seeing it with very simple examples of everyday life. For example: Web sites with SSL security certificates, new privacy and personal data protection policies, new technologies for industrial systems with embedded cybersecurity, industrial cybersecurity standards As the voice of the conformity assessment system and standards of the United States of America. The American National Standards Institute (ANSI) empowers its members and constituents to strengthen the position of the US market in the global economy while helping to guarantee the ... Learn more/ ISA99 / IEC-62443, and many other initiatives. In a couple of years we will be immersed in a complete new scenario, a scenario that is approaching very quickly!