Secure & flexible authentication

2FA

Effortlessly add a second layer to your login – password authentication.

SSO

eXo supports most authentication protocols – SAMLV2, Oauth2, OpenID connect.

LDAP

Set-up an LDAP flow; synchronize users, groups & spaces; propagate your login information.

Security features highlights - privacy by design

Secure spaces

eXo segments collaboration and data by spaces, restricting the right to know to space members, by default.

 

Spaces are further protected through different visibility and access levels.

form3-3-right

Space 2FA

Some spaces / pages can be further protected through an additional 2FA authentication, required to access.

form-5-left

Hidden directories

Spaces and people directories can be hidden at all levels.

Hidden profile fields

Users can hide some of the fields in the profiles pages, to protect their privacy.

form6-4-left

Fine grained permissions

eXo offers fine-grained permissions management, based on roles, groups and spaces. Permissions can then be configured for each page, object, action…

Guest management

eXo enables guest users to join and collaborate securely, while automatically limiting their privileges.

Data leak protection

Suspicious documents can be quarantined upon upload, pending review, based on predefined key words.

Lock down

All downloads and shares can be disabled in one clic, in case of suspicious activity.

form10-2-left

Flexible hosting & data localization

SaaS

Hosted and managed by eXo, on a trusted IaaS provider cloud infrastructure.

Private cloud

Hosted and managed by eXo in a dedicated infrastructure, under your domain name, with data localized in your country.

On-premise

Deployed on your servers, in accordance with our standards. Managed by your teams or by eXo Platform.

Engagement des collaborateurs
Tailored

Deployed in your choice of infrastructure, complying with your constraints and special security needs.

Infrastructure Labels

All eXo's trusted IaaS partners hold high security certificates and follow the best industry practices.

GDPR compliance

eXo Platform processes data in compliance with GDPR guidelines, in particular when it comes to clients’ data.

 

In addition, eXo Platform helps its clients follow GDPR, when using its software, thanks to dedicated privacy management features.

 

Read our website privacy policy regarding website management. Contact us, to request our full GDPR compliance report.

eXo follows ISO 9001, 27001 & 27002 practices

eXo practices
Policies & organisation
Governance
Security risk management
Information security organisation
Internal security policies, risk management & organization

v v v
Architecture & general design
Technical architecture
Targeted availability
Business continuity & recovery
...
Security measures with regards to technical architecture, infrastructure, recovery & more

v v v
HR security
Selecting
Recruiting
Training
...
Measures with regards to HR management

v v v
Data security
Information classification
Data protection
Data localization
...
Security measures dealing with data protection

v v v
Assets management
Inventory & return
Mobile & BYOD
Remote work
...
Managing devices & remote work practices

v v v
Identity & access management
Access control
Access rights
User authentication
...
Security measures with regards to user access

v v v
Encryption & key managemnet
Data encryption
Password hashing
Password policy
...
Security measures with regards to data encryption

v v v
Physical & environmental safety
Measures in relation to servers' physical security
v
Operating system security
Segregation
Data backups
Logs management
...
Security measures protecting operating systems

v v v
Reversibility
Full data reversibility upon contract termination
v
Operations security
Protecting administration accesses
v
Software development security
Security by design
Security by development
Test data security
...
Security measures with regards to code development & testing

v v v
Subcontractor management
Reviewing and managing subcontractors
v
Security incidents management
Measures with regards to security incidents detection and management
v

Build your solution

An all in one platform with everything you need

Contact us
choice15-1-left-bottom choice15-1-right-top choice15-1-right-bottom
1