UNIVERSE OF ITEMIZED PRODUCTS


CYBERSECURITY & DIGITAL SECRETS SAFEKEEPING:

The predicament unsolved:

> You just want it DONE PROPERLY for you.

yet everyone keeps telling you

how YOU should do it, because, well.... it's your secrets...



That's the cake paradox:

Everyone just keeps giving you difficult recipes of products to assemble to achieve various levels of security. In reality, you often end up alone performing the various "recipe" steps, when all you want is the finished cake!

ENTER THE INNOVATION:

>>manage your secrets with an attorney. Because being trustworthy and managing secrets.... well... that's already our job definition <<

Tasking us with the creation of a Secure ID dedicated to your cybersecurity & managed by IDtorney

> That's rightfully where 100% of our clients start their journey


IDtorney may:






the following products in various bespoke solutions tailored to each customer's need.

OUR PRODUCTS PHILOSOPHY


1- Top players in their field.

2- No single provider dependency.

3- Redundancy of features in the bundled products to avoid any single provider dependency.

4- Since not dependent, falling behind products must be replaceable like movable blocks.

Bottom line: we are fearless of change and adapt quickly when technologies are no longer be the best choice in the client's interest.

BECAUSE OUR LIFE IS ALL ABOUT COMMUNICATION

MAILtorney: a single product-pack of up to four of the following components


YOUR EMAIL DEDICATED TO CYBERSECURITY & IDtorney ID


Origin: Germany, compliant with zero-knowledge encryption


  • Encrypted Email. Tutanota is the world's most secure email service, easy to use and private by design.



END-TO-END MESSAGING WITHOUT LEAKS


Origin: Switzerland, compliant with zero-knowledge encryption


  • Threema.Work :Trusted by millions. Built for business.

  • Encrypted Messaging, Voice & Video. Secure and privacy-compliant.

LARGE FILES COLLABORATION & WEB PORTALS

Origin: USA, compliant with zero-knowledge encryption.

  • Encrypted file sharing & dedicated portal for existing systems such as Outlook, Gmail and with an API supported by many third-parties such as CRMs.

  • The end-to-end encryption platform for modern business that lets you easily exchange information with anyone on any device.

BECAUSE EVERYWHERE YOU MUST LOGIN TO IDENTIFY YOURSELF

LOGINtorney for the cloud: a single product-pack of up to four of the following components

PASSWORDLESS SECURITY AND YOUR IDENTITY PROVIDER WITHIN IDtorney

Origin: USA, security is Zero-Trust compliant.

  • Our primary Full Stack identity provider with passwordless authentication.

  • a comprehensive and frictionless solution fully-secured with dynamic passcodes and out-of-band multi-factor authentication.



THE MOST ADVANCED SINGLE SIGN-ON AND AUDITING PLATFORM

BY

Origin: USA, public company & SOC 2. Security is Zero-Trust compliant.

  • Our supplemental identity provider with extensive single sign-on features, mobile compatible and extensive security features.

  • A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.


MANDATORY ADDITIONAL HARDWARE SECURITY


Origin: Sweden, with multi-protocol security support


  • Stop account takeovers, go passwordless and modernize your multi-factor authentication. Get the world’s leading security key for superior security, user experience and return on investment.


SO HAVING A VPN AVAILABLE ALL THE TIME EVERYWHERE IS A GIVEN


Origin: USA

Claim to fame: World's most advanced VPN


  • Online privacy and security, encrypt your internet connection, and keep your browsing history private

  • A fast connection, and no limits on bandwidth. 5300 NordVPN servers in 59 countries to enjoy the fastest VPN experience.

BECAUSE KEEPING SECRETS PRIVATE AND SAFE IS A ROOT NEED.

SECRETtorney: a single product-pack of up to three of the following components

STORED SECURELY, PASSWORDLESSWITH OR WITHOUT MEMORY

Origin USA, public company & SOC 2, security is compliant with Zero-Trust framework and zero-knowledge encryption.

  • A very well know and recognizable established leader.

  • A mobile or desktop friendly and resilient password manager ensuring your passwords are always UNIQUE and off the DarkWeb with plenty of backup and safe recovery solutions.



SO YOUR STORAGE IS ALWAYS E2EE

AND BACKED-UP


Origin: Canada, compliant with zero-knowledge encryption

  • Proudly Canadian and a complete turn-key solution for storage, sharing, online backup & online only vaulting.

  • Sync protects your privacy with end-to-end encryption — ensuring that your data in the cloud is safe, secure and 100% private.

  • End-to-End Encrypted storage that does not prevent easy file sharing.

  • Supplemental ultra-secure online only documents vault.

  • 365 days automatic backup and serialization of files.

AND SECRETS

SAFELY ENCRYPTED

Origin: USA, compliant with zero-knowledge encryption

  • Store API keys, passwords, certificates, and other sensitive data, such as Blockchain Master Seed Passwords.




BECAUSE YOU CAN'T NEGOTIATE DEVICES SAFETY AND SECURITY

LOGINtorney for hardware: a single product-pack of up to four of the following components


SO YOU HAVE THE MOST SECURE COMPUTER



Origin USA: security is following all the Google Enterprise sandbox requirements.

  • Google Chrome Enterprise unlocks the business capabilities of Chrome OS, Chrome Browser, and Chrome devices.

  • Enjoy the protections of ephemeral browsing sessions, yet personalized by IDtorney with essentials security and privacy Chrome extensions.

  • Strong auditing features, constant updates easy remote support by IDtorney and enterprise grade controls.

  • With a hardware plus for the best Chromebook security: powered by the Titan C chip.

SO YOU HAVE

> WINDOWS 10 <

ON THE MOST SECURE COMPUTER


Origin USA: security is following all the Google Enterprise sandbox requirements.

  • Parallels®️ Desktop for Chromebook Enterprise.

  • Bringing the power of the safest Windows experience on Chromebooks: Unleash the full potential of the Chromebook AND the full power of the Windows ecosystem

  • Run full-featured Windows applications, including native Microsoft Office, on Chromebook Enterprise devices — online and offline.

SO YOUR DEVICES ARE REAL-TIME AUTHENTICATED


  • Origin: Canada, security is NIST Continuous Authentication compliant.

  • Plurilock Defend: Full-day, real-time identity without extra hardware.

  • Spots and monitors unauthorized credential use all day long—no extra devices, steps, or workflows.

SO YOU CAN BREAK-UP WITH ACTIVE DIRECTORY

A GOOD THING!


Origin: USA, security is Zero-Trust compliant


  • Cloud Directory Platform for Windows, Mac and Linux that allows you to do better without Microsoft Active Directory

WHATEVER THE DEVICE, NOW WITH MFA EVERYWHERE.

WHEREBY ANY EXISTING CORPORATE LOGIN CAN BE STRENGHTENED


Origin: France, security is Zero-Trust compliant.



  • Enterprise grade multi-Factor authentication especially suited for corporations that need to supplement their existing infrastructure with additional deviceless security, that have not fully embraced the cloud or need to deal with hybrid environments.

  • High Security MFA. Deviceless. Passwordless. Effortless.

BECAUSE CRYPTO-CURRENCIES AND BLOCKCHAINS MUST BE ON YOUR ROADMAP, WE GET YOU SAFELY STARTED.


SO YOUR CRYPTO WALLETS ARE ALSO PHYSICAL



Origin: France


  • Cryptocurrencies hardware wallet to ensure you always have an alternative to cloud-based wallets for cryptos.

  • A hardware wallet is a cryptocurrency wallet which stores the user's private keys (critical piece of information used to authorise outgoing transactions on the blockchain network) in a secure hardware device.