Loading...


Your gateway to the forefront of innovation.

Since 2020, our expertise propels businesses to harness the full potential of IT technologies.
We focus on creating personalized, cutting-edge digital solutions that effectively resolve your specific challenges.

IT Security & Compliance

IT Security & Compliance

Comprehensive cybersecurity services ensuring top regulatory compliance including GDPR, SOC 2 Type II, ISO 27001, and NIST.

Security specialties:

· DevSecOps: Secure pipelines, scanning, image signing, shift-left security

· Supply Chain Security: SLSA Level 1-3, Chainloop, SBOM (Syft/Tern)

· Container Security: K8s RBAC, OPA/Kyverno, admission controllers

· Corporate Security: Jamf Pro (MDM), CrowdStrike/SentinelOne (EDR), Splunk (SIEM), pfSense/NextDNS

· Vulnerability Management: DefectDojo, continuous scanning, SAST/DAST

· Zero Trust: Twingate, ZeroTier, OpenZiti, Cloudflare Access

· IAM: Teleport, OIDC/OAuth, Okta, Azure AD/Entra ID, Yubikeys

· Encryption: BYOK, CMK, envelope encryption, KMS/HSM, TEEs

· Compliance: GDPR, SOC2 Type II, ISO 27001, NIST

DevOps & Infra

DevOps & Infra

Expert infrastructure setup across cloud platforms, on-premises solutions, and blockchain/Web3 services.

DevOps & Cloud:

· Cloud: GCP, AWS, Hetzner, multi-cloud strategies

· IaC: Terraform, Ansible, GitOps (ArgoCD, FluxCD)

· Containers: Kubernetes, Docker, Helm, Kustomize

· Development: Go, Python, TypeScript, Shell

· Operations: Monitoring, logging, alerting, tracing, disaster recovery, FinOps

Blockchain & Web3:

· Key Management: Secure key mgmt, KMS/HSM, remote signers in TEEs

· Cryptography: Key sharding with TSS (Threshold Signature Schemes), DKG

· Multi-signature: SSS threshold signing, Horcrux, MPZD, FROST, cb-mpc

· Infra: Blockchain validators, RPC nodes, L2s and Rollups infrastructure

AI & LLM Security

AI & LLM Security

End-to-end AI security: audit, architecture, implementation, and governance.

AI security expertise:

· AI Gateways & Proxies: Centralized deployment (Kong, Portkey, F5), hub-and-spoke architecture, API & model access control

· AI Threat Protection: Prompt injection, data poisoning (RAG & datasets), jailbreaking, tool-calling exfiltration, shadow AI

· Guardrails & Content Filtering: AWS Bedrock Guardrails, NVIDIA NeMo, Guardrails AI, output policies, response validation

· DLP for AI: Real-time PII detection, redaction/tokenization, LLM Guard, Nightfall AI

· AI Governance (AI TRiSM): AI usage inventory, data classification, RBAC policies for LLM apps & agents

· LLM Monitoring: Structured logs, SIEM integration, abuse detection, drift & quality monitoring (Datadog LLM, Langfuse)

· AI Compliance & Privacy: GDPR for LLMs (DPIA, data minimization), EU AI Act readiness, HIPAA, ISO/IEC 42001

· Data Sovereignty: Regional deployments / VPC / on-prem, BYOK/KMS/HSM encryption

Privacy & Data Sovereignty

Privacy & Digital Sovereignty

Enterprise-grade privacy solutions and self-hosting services to maintain digital sovereignty and protect against surveillance.

Privacy technologies:

· Self-Hosted: Vaultwarden, GitLab, Mattermost, Supabase deployment

· Database Security: Field-level encryption, searchable encryption proxy

· Cold Secret Storage: Cold storage and long-term backup of critical digital assets (root CAs, master keys)

· Emergency Recovery: Secure credential storage with coercion resistance

· Privacy Tools: Encrypted DNS proxies, SimpleX Chat, source code obfuscation

· Analytics: Privacy-focused Plausible/Matomo implementation

· File Protection: Cryptomator integration, secure storage solutions

· Confidential Compute: MPC, TEEs (Trusted Execution Environments)

Trusted by Great People

Here are some of the companies that have trusted our team...

Read What Our Clients Say

Discover authentic feedback from our satisfied clients and partners

Internal Projects

Open-source projects we maintain and Innovative solutions we've launched

Fractum

Secure File Encryption Tool

71 2

Protect your most important digital secrets by splitting them into encrypted pieces. Store your passwords, crypto wallets, and sensitive documents safely across multiple locations—even if some pieces are lost or stolen, your data stays secure and recoverable.

Cold Storage Threshold Cryptography Encryption Tool

Threshold MPC Solana Oracle

Multi-Party computation signing

This project demonstrates secure key management and signing without centralized storage of the private key (unlike traditional KMSs that create single point of failure). Employs threshold MPC & DKG to protect private keys used in Solana smart-contract updates. Can tolerate up to 1 malicious/offline party and still function.

MPC Consensus Threshold Cryptography Solana Oracle DKG ECDSA

Acra-Enclave

E2E Database Encryption

The primary goal of this architecture is to prevent sensitive data leakage (PII, financial data, health records, etc.) while maintaining practical usability in production environments. While emerging technologies like Multi-Party Computation (MPC) and Fully Homomorphic Encryption (FHE) show promise, they aren't yet production-ready or scalable for most real-world applications. This architecture provides a pragmatic alternative.

AWS Nitro TEEs Database Security E2E Encryption

SwanWatch.io

AI Risk Analysis

Save Your Crypto Before The Next Platform Collapse. Get 6-12 hours to withdraw before platforms crash or freeze. Our AI detects patterns that preceded FTX and LUNA collapses, giving you critical time to withdraw. Our AI monitors 100,000+ signals every 15 minutes across social media and on-chain data. Get instant alerts when we detect patterns matching previous platform collapses.

AI Detection Risk Analysis Early Warning

Get in Touch

Interested in getting started on your project?

Send us an Email

Get in touch directly via email for detailed discussions about your project requirements.

Send Email
Schedule a Meeting

Book a 20-minute consultation call to discuss your project and explore how we can help.

Book 20min Call

Worldwide - Remote Services

Based in France | Available in CET and European timezones