top of page
002-B-LOGO-ANTEIA-BLANCO-FONDO-TRANSPARENTE.png

beyond integration
Experience the power
of hyper automation

Cybersecurity Mesh

A cybersecurity model is a set of policies, procedures, and technologies designed to protect a computer system and associated data against security threats. Cybersecurity models are based on a proactive approach to security management, which includes threat identification, risk assessment, implementation of security measures, and continuous monitoring to detect and respond to attacks.

​

A good cybersecurity model is  effective in preventing and detecting threats, but it must also be flexible and scalable to adapt to changes in technology and threats. You need to consider both traditional security technologies, such as firewalls and intrusion detection systems, as well as new technologies, such as artificial intelligence and the cloud.

​

In addition to technology, an effective cybersecurity model must include strong security management practices, such as staff training and security awareness, backup and disaster recovery planning, and data security policy. It is also important to consider compliance with relevant security regulations and standards, such as PCI DSS and HIPAA.

​

An organization's cybersecurity model should be regularly reviewed and updated to keep up with the latest threats and trends in security technology. This includes the continuous evaluation and improvement of security policies and practices, the training of personnel, and the continuous monitoring of the network and systems to detect and respond to threats.

​

Our Architecture is an innovative approach to protect networks and computer systems against security threats. Instead of relying on a centralized security solution, it distributes protection across multiple layers that work together to ensure complete network security. It is an effective and sophisticated approach to protect networks and computer systems against security threats. It offers defense-in-depth, early threat detection, flexibility and scalability, and reduced vulnerability to attack. All of this helps ensure the security and continuity of network services.

​

It offers flexibility and scalability, which means it can adapt to and grow with an organization's changing security needs. Additionally, the decentralized nature of the security mesh makes it less vulnerable to attacks that exploit weaknesses in centralized systems.
 

Benefits

Allows multiple signers. 

​

Allows you to sign documents faster and more efficiently compared to scribble signatures. 

​

Helps protect the confidentiality and integrity of documents.
 
It is more affordable than signing on paper and can reduce the costs associated with managing paper documents and physically mailing them.

​

Documents can be signed from anywhere at any time, which is more convenient than having to be in a specific place to sign on paper.

​

The electronic signature reduces the use of paper and shipping costs, which contributes to an environmentally sustainable practice.


It gives the possibility to people with disabilities to sign documents in a more accessible way.

​

It allows for greater transparency and traceability in document management, which can be useful in audits and reviews.

​

It can be easily integrated with other systems and applications, increasing the efficiency and effectiveness of document management.

​

It allows the automation of processes and the elimination of human errors, which increases the precision and speed of document management.

​

You can make adjustments and updates in real time, increasing flexibility and adaptability in document management.

​

Reduces the risk of document loss, damage or theft, increasing security and reliability in document management.


Access and manage  documents faster and more efficiently, which improves productivity and efficiency.

​

It is compatible with mobile devices, allowing greater mobility and flexibility in document management.

​

G.lossario

Cryptographic algorithm. It is a mathematical process that is used to encrypt and decrypt messages and to generate cryptographic keys.


Authentication. It is the process of verifying the identity of a user.


Self signature. It is an electronic signature that is made without the intervention of a certification authority.


Certification authority (CA). It is an entity that issues and manages digital certificates.


Digital certificate.It is an electronic file that contains information about a user's identity and their public key.


Root certificate.It is a certificate that is the root of trust in a public key infrastructure.


public key. It is a cryptographic key that is used to encrypt messages and to verify the identity of a user.


private key. It is a cryptographic key that is used to decrypt messages and to sign electronic documents.


encryption. It is the process of encoding a message so that it can only be decrypted by the recipient.

 


Signature with time stamp.It is an electronic signature that includes a time stamp that shows the date and time the signature was made.

 


Digital signature. It is an electronic representation of a signature, which is used to authenticate electronic documents.

 

 


Electronic signature.It is an electronic representation of a handwritten signature, used to authenticate electronic documents.

 

 


Advanced electronic signature (FEA). It is a type of electronic signature that provides a high level of security and trust.


Recognized electronic signature (FER).It is an electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature.

 


Multiple signature.It is an electronic signature that is made by more than one person.


hash. It is a unique representation of a message, which is used to verify the integrity of an electronic document.

 


Public Key Infrastructure (PKI).It is a set of procedures, protocols and services used to create, manage and validate digital certificates.


Integrity. It is the guarantee that an electronic document has not been altered since it was signed.


I do not repudiateIt is the guarantee that a user cannot deny having signed an electronic document.


Security token.It is a physical device or software that stores private keys and is used to sign electronic documents.


Timestamp.It is a timestamp that is added to an electronic document to show the date and time it was signed.


Certificate validation.It is the process of checking the validity of a digital certificate.


Check. It is the process of checking the validity of an electronic signature.
 

How does it work?

4.png

Setting

Missing to define the format for tables

​

Process

Missing to define the format for tables

Use cases

Financial legal contracts and agreements.

​

Billing and monitoring of payments in the accounting sector.

​

Job application forms and monitoring of the hiring process in human resources.

​

Requests for orders and monitoring of the supply chain in companies of  logistics.

​

Medical forms and record of clinical histories.

​

Applications for enrollment and monitoring of students.

​

Travel request forms and travel management.

​

Credit applications and loan monitoring.

​

Insurance application forms and claims tracking.

​

Requests for inspection and monitoring of products in the manufacturing industry.

​

Requests for acquisition and monitoring of real estate.

​

Loan contracts, investment agreements, credit card applications.

​

Real estate. purchase-sale contracts, rental contracts, property deeds.


Medical consents, electronic medical records, medical prescriptions.

​

Permit applications, public service contracts.

​

Software license agreements, cloud service provider agreements, outsourcing agreements.

​

Enrollment applications, teacher contracts, professional internship agreements.

​

Transport contracts, delivery agreements, storage agreements.

​

Insurance policies, reimbursement requests, indemnity agreements.

​

Supply agreements, purchase contracts, technology license agreements.

​

Online purchase agreements, subscription contracts, affiliate agreements.

​

Hotel reservation contracts, vacation rental contracts, catering agreements.

​

Input supply agreements, crop sales contracts, land lease agreements.
 

jr-korpa-_4BcJRzJebk-unsplash.jpg

Frequent questions

What is the difference between digital and electronic signature? 

 

The electronic signature refers to the authentication and validation of documents in digital format through cryptography and security technologies, while the digital signature refers to a signature in digital format, but which does not necessarily have the same levels of security and authenticity than an electronic signature. That is, the electronic signature is a specific type of digital signature that meets certain security and reliability standards.


What types of electronic signatures are there?

 

  • Simple electronic signature.  Electronic representation of a handwritten signature, used to authenticate electronic documents.

​

  • Digital signature.  Electronic representation of a signature, used to authenticate electronic documents.

​

  • Advanced electronic signature (FEA).  It is a type of electronic signature that provides a high level of security and trust.

​

  • Recognized electronic signature (FER).  Electronic signature that meets the legal requirements to be recognized as equivalent to a handwritten signature.

​

  • Self signature.  Electronic signature that is carried out without the intervention of a certification authority.

​

  • Multiple signature.  It is done by more than one person.

​

  • Signature with time stamp. Electronic signature that includes a time stamp that shows the date and time the signature was made.

 

​

What documents can be signed electronically?

​

Any document that can be stored in electronic format can be signed electronically. This includes contracts, invoices, legal documents, official documents, work documents, among others. The electronic signature allows authenticating and verifying the integrity of these documents, which gives them legal validity and provides them with a higher level of security.


How is the authenticity of an electronic signature verified?

​

It is verified using the public key corresponding to the signature. The process consists of decrypting the information signed with the public key and comparing it with the original document to verify that the signature is valid and has not been altered. It can be verified that the digital certificate used to sign is valid and has not expired. This verification can be done by specialized software or through a certification authority.


What requirements must be met to perform an electronic signature?

​

To perform an electronic signature, several requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys (a public key to encrypt messages and verify the identity of a user, and a private key to decrypt messages and sign electronic documents), have an application or device that allows electronic signatures to be performed and meets the required security standards, adequately protect private keys, comply with the rules and regulations applicable in the country or jurisdiction where it is performed the electronic signature, and have a public key infrastructure (PKI) that allows validating the electronic signature and guaranteeing trust in it.

​

 

How is the security of electronic signatures guaranteed?

​

A series of requirements must be met, such as having a verified identity and a digital certificate issued by a trusted certification authority, using cryptographic keys, having an application or electronic signature device that complies with security standards, adequately protecting private keys , comply with applicable rules and regulations, have a public key infrastructure (PKI), and use encryption and authentication techniques to protect the integrity of electronically signed documents. In addition, it is important to keep electronic signature software and devices up to date to avoid potential security vulnerabilities.

 


How is the electronic signature integrated into business processes?

​

The electronic signature can be integrated into business processes through the automation and digitization of the processes that require the signing of documents. This may include the creation of electronic forms for the collection of information and the signing of the same, the implementation of approval workflows that allow the signing of documents online and the integration of the electronic signature with document management and information management systems. business processes. In addition, it is important to guarantee the integrity and security of the documents and the electronic signature through adequate security measures, such as data encryption and user authentication.


What happens if the device used for the electronic signature is lost or damaged?

​

How is an electronic signature revoked?

​

How is the privacy of electronic signatures guaranteed?

​

How is the integrity of electronically signed documents carried out?

 

How can non-repudiation be guaranteed in electronic signatures?

​

What systems or technologies are used for the electronic signature?

 

How is the authentication of users who perform electronic signatures performed?

 

How can electronic signatures be stored and managed?

 

What legal implications does the electronic signature have?

 

Is the electronic signature valid in any country?

 

What support does the electronic signature have?

 

What are the mechanisms to sign?

 

Biometric fingerprint and OTP.

​

Can you sign multiple documents simultaneously?

 

How many signatures can I put on a document?

 

Do you have end user support?
 

Regulation

Argentina.The electronic signature in Argentina is regulated by the Electronic Signature Law 26. electronic signature No. 26.199, which establishes the rules for the use of electronic signatures, certifications and public key infrastructure.

​

Brazil. The regulation of electronic signatures in Brazil is established in Law No. 12,651/2012, which establishes the rules for the use and validity of electronic signatures, as well as the responsibility of service providers electronic signature.

​

Chili. The regulation of electronic signatures in Chile is established in Law No. 19,799, which establishes the rules for the use of electronic signatures, certifications, and public key infrastructure.

​

Mexico.The regulation of the electronic signature is established in the Law of Electronic Signature (Law of Information Technology and Electronic Commerce) and its regulations (Regulation of the Law of Electronic Signature). These laws establish the rules for the use of electronic signatures, certifications and public key infrastructure. In addition, they establish the responsibilities and obligations of electronic signature service providers and establish the procedures for the verification and validity of electronic signatures. Advanced and recognized firms are also regulated.

​

Costa Rica. It is established in the Electronic Signature and Electronic Documents Law (Law 8968) and its regulations. This law establishes the rules for the use of electronic signatures, certifications and public key infrastructure. In addition, it establishes the responsibilities and obligations of electronic signature service providers and establishes the procedures for the verification and validity of electronic signatures. Advanced and recognized firms are also regulated. In Costa Rica there is an entity in charge of regulating and supervising the electronic signature is the IFT (Costa Rican Electricity Institute).

​

Colombia. The regulation of the electronic signature is established in Law 527 of 1999 and its regulatory decree 2364 of 2012, known as the "Electronic Signature Law". This law establishes the rules for the use of electronic signatures, making clear the concept of signature "Methods such as codes, passwords, biometric data, or private cryptographic keys, which allow to identify a person, in relation to a message of data, as long as it is reliable and appropriate with respect to the purposes for which the firm is used, taking into account all the circumstances of the case, as well as any pertinent agreement. Taking into account that in the case of electronic signatures, unlike the digital signature, there is no third-party certifier, under the legal framework  establish the responsibilities and obligations of the providers, as well as the general standards of verification and validity. 


Panama. It is established in Law 41 of 2007, which establishes the rules for the use of electronic signatures, certifications and public key infrastructure. The law establishes the responsibilities and obligations of electronic signature service providers and establishes the procedures for the verification and validity of electronic signatures. Advanced and recognized firms are also regulated.


Ecuador. The regulation of the electronic signature is established in the Law of Electronic Signature and Electronic Documents (Law of Information Technology and Electronic Commerce) and its regulations. These laws establish the rules for the use of electronic signatures, certifications and public key infrastructure. In addition, they establish the responsibilities and obligations of electronic signature service providers and establish the procedures for the verification and validity of electronic signatures. Advanced and recognized firms are also regulated. In Ecuador there is also the National Electronic Signature Certification System (SNCFE) which is in charge of issuing and revoking electronic signature certificates.

​

Peru.The regulation of the electronic signature is established in the Electronic Signature and Electronic Documents Law (Law 27269) and its regulations. These laws establish the rules for the use of electronic signatures, certifications and public key infrastructure. In addition, they establish the responsibilities and obligations of electronic signature service providers and establish the procedures for the verification and validity of electronic signatures. Advanced and recognized firms are also regulated. In Peru, there is an entity in charge of regulating and supervising the electronic signature: OSIPTEL (Supervisory Agency for Private Investment in Telecommunications).

​

Analytics

Number of documents signed, number of active users, average session duration.

​

Response times, error rate, level of availability.

​

Number of users, roles and permissions assigned, level of user activity.

​

Average time to perform an electronic signature.

​

Number of valid and invalid certificates, certificate validation success rate.

​

Integration with other systems.

Number of integrations made, types of integrated systems (CRM, ERP, etc.), level of success of the integrations.

​

Number of successful and failed signatures, overall success rate.

​

Level of user satisfaction, pain points and problems reported, level of adoption of the platform.

​

Number of users who access the platform from mobile devices, types of devices used.

​

Geography. Geographic location of users and signed documents, analysis of geographic trends.

​

Total cost of implementation and use of the service, costs per user and per signed document.

​

Trends in the use of the platform, trends in user satisfaction, trends in the adoption of new features.

​

Documents created, shared and collaborative.


Average time per document.
 

Buys

Still missing from the document
 

api

Still missing from the document
 

bottom of page