top of page

PARSEC

PARSEC is an easy-to-use application dedicated to the cyber-protection and end-to-end encryption sharing of sensitive data on the Cloud. PARSEC provides the cryptographic guarantee that the sharing of sensitive and confidential data is neither read nor modified by a third party with no need to know. 


PARSEC is an open source cryptographic software that acts like a collaborative "Dropbox", asynchronous, resistant to network disruption and heavy files exchanges, easy-to-use, providing end-to-end encryption and zero trust, zero knowledge and anti-ransomware, certified by ANSSI (French security cyber agency), which we have developed in partnership with the French Ministry of the Armed Forces the French government and other private-sector customers. Private sector customers. 


PARSEC Data security functions include : confidentiality, integrity, historicization, non-repudiation, revocation, authenticity. 


PARSEC is TRL 9 (ready to use for desktop and web) and the roadmap 2025 foresee mobile declination, collaboration edition and data centric security for military uses.

  • The “Data Zero Trust” market, and in particular that of data security, which is the one we are interested in, is global and international and European first. 


    National and European security will inevitably require European organizations to protect themselves against foreign interference, made possible on the one hand by the use of foreign cloud infrastructures, and on the other by the massive advent of artificial intelligence, which is siphoning off our organizations' knowledge. However, there is no such thing as a level 3 Data Centric Security system (in the NATO sense), i.e. one that can transport data access control in terms of integrity and confidentiality, with the data itself, in other words, to enable the controlled, integrated and confidential sharing of classified data in compliance with a classification and authorization policy. All the more so if this system processes data not at the granular level of the document, but at that of the flow, thus paving the way for asynchronous, encrypted asynchronous, encrypted and signed exchanges, even over intermittent networks. 


    NIAG (NATO Industrial Advisory Group) groups have been working on these issues for several years, and their conclusions point to a level of complexity that will never be reached by traditional methods. The horizons are far off (beyond 2036!). 


    We believe that an alternative is to centralize data security as close as possible to the end-user, i.e. at the terminal level, which is considered the only trusted environment (provided it has been properly installed). The need may seem uniquely military. In fact, it is generic, as the threat to knowledge and data is set to grow at the same pace as artificial intelligence technologies. And the need to seal off data from central servers in 3-tier and database architecture will become paramount for entities handling sensitive data.

  • Parsec provides a robust solution for securing data across complex, multi-domain environments, enhancing societal resilience and Allied defence and security cross-coalitions through advanced encryption, Zero Trust. 

    • Local Encryption and Security decentralization: Enhances security and resilience close to the user and the device and reduces reliance on centralized servers. 

    • Rust-Based Codebase: Allows for state-of-the-art safety, while making it available on any platform (desktop, mobile, web, IOT)". 

    • Open-Source Flexibility: Allows continuous improvement and adaptation to new threats. 

    • PKI Integration: Simplifies key management and distribution, making high-level cryptographic security user-friendly. 

    • Enhanced Resilience through Asynchronous Operation: The ability to function securely even with disrupted network connectivity is a key feature which ensures that critical operations can continue without compromising security, and making it ideal for use in environments where network reliability cannot be guaranteed. 

    • Cryptographic Enclaves: Parsec encapsulates data within cryptographic enclaves, providing comprehensive security functions such as confidentiality, integrity, authenticity, traceability, and non-repudiation. 

    • Zero Trust and Zero Knowledge Principles: Parsec operates on a zero trust basis, meaning that no entity, internal or external, is trusted by default. Every access request is authenticated and authorized, and all data interactions are logged and traceable. This approach significantly reduces the risk of data breaches and unauthorized access.

  • Features are : 

    1. Key distribution : - Integrates a Public Key Infrastructure (PKI), simplifying the secure management and distribution of encryption keys with partners - Pluggable with existing centralized public key infrastructures, enhancing security and ease of use. 

    2. Initial trust: the Short Authentication Chain (SAS) mechanism for user enrolment ensures secure initial exchanges between external users and devices, establishing a crucial foundation of trust for subsequent cryptographic operations 

    3. Data validation: zero-trust, zero-knowledge approach. Client-side cryptographic security handles user enrolment, decryption and signature verification, while server-side security ensures authorized access and routing of encrypted data packets. This two-tier security model guarantees end-to-end protection and validation of data integrity at every stage of transmission 

    4. Granular data security: integrates cryptographic security directly into application data flows, ensuring that every data interaction, whether file download, video playback or data exchange, is protected by encryption and validated by cryptographic signatures Breakthrough technologies: 

    5. Zero Trust Architecture (ZTA): ensures that every access request is verified, authenticated and authorized, regardless of location or network state. This eliminates implicit trust assumptions and minimizes attack surfaces 

    6. End-to-end encryption (E2EE): ensures that data remains encrypted from the moment it leaves the user terminal's security memory device until it reaches its destination. This ensures confidentiality and mitigates the risk of data breach or interception during transmission 

    7. Asynchronous communication: guarantees continuous, secure data access and collaboration, regardless of network reliability 

    8. Data-centric security (DCS): incorporates metadata-based encryption and tagging. Data retains its security attributes throughout its lifecycle, facilitating secure sharing and interoperability

  • The company was cofounded by : 

    • Thierry LEBLOND (CEO), Engineer General of Armaments, former director of CCTV of Paris deployment, former of the French ministry of the Army and French ministry of the Interior. 

    • Emmanuel LEBLOND (CTO), his son, software engineer graduated from EPITA. 

    The company welcomes now 14 peoples, mostly R&D high level engineers. 75% of our activities are R&D development in Zero Trust data security.

    The company was cofounded by : 

    • Thierry LEBLOND (CEO), Engineer General of Armaments, former director of CCTV of Paris deployment, former of the French ministry of the Army and French ministry of the Interior. 

    • Emmanuel LEBLOND (CTO), his son, software engineer graduated from EPITA. 

    The company welcomes now 14 peoples, mostly R&D high level engineers. 75% of our activities are R&D development in Zero Trust data security.

bottom of page