
Your data belongs to you.
Let's take back control, together.
DIV Protocol is building the European suite of sovereign, encrypted and auditable work tools. No more compromise between simplicity, sovereignty and compliance. A secure drive today, a blockchain audit log tomorrow.
The problem
Your sensitive data no longer belongs to you.
Storing your documents with Google, Microsoft or AWS gives them the ability to read, analyze, copy or transmit your content — on request or by accident. You lose data sovereignty.
0%
of European data is hosted by operators subject to the US Cloud Act.
0/3
of companies have suffered a leak or a confidentiality incident in the last 24 months.
Zero
complete European alternative to US suites for document productivity. Until today.
Our conviction
No data can be read without the explicit agreement of the company that owns it.
Zero read without consent
The encryption key is exclusively in your possession — only you can access it.
Zero single point
Files are distributed across multiple distinct hosts to ensure better protection and availability.
Zero data in our possession
We keep no information that would allow us to decrypt or access the data.
Our products
A sovereign suite, built to grow with you.
Today, the secure drive. Tomorrow, the blockchain audit log. Later, much more.
DIV Drive
Encrypted storage, shared projects, real-time collaboration, secure third-party sharing. Everything your teams need to work, without ever losing control.
End-to-end encryption (E2E)
Distributed architecture in Europe
Precise multi-criteria search
Granular permissions & roles
Shared projects
Collaborative editing
DIV Check
Coming soon
Every action on Drive becomes irrefutable proof. Cryptographic fingerprint, public timestamp and audit log ready to present to a judge or auditor.
Cryptographic fingerprint
Verification API
CSV exports
Blockchain anchoring
Certifications
The security of your data is not optional.
GDPR compliant
We guarantee the sovereignty of your data with strict GDPR compliance.
GDPR compliant
GDPR compliant
We guarantee the sovereignty of your data with strict GDPR compliance.
SecNumCloud
Our datacenters provide maximum protection, the infrastructure ensures the confidentiality of your data.
SecNumCloud
SecNumCloud
Our datacenters provide maximum protection, the infrastructure ensures the confidentiality of your data.
ISO 27001
Our ISO 27001 certified datacenters ensure proactive risk management to protect your data.
ISO 27001
ISO 27001
Our ISO 27001 certified datacenters ensure proactive risk management to protect your data.
Founding team
Those who bring the product to life
A creative and curious European team, expert in security, cloud and product experience, building together what they believe in.
Gaspard Bonnot
CEO
Founding team
Those who bring the product to life
A creative and curious European team, expert in security, cloud and product experience, building together what they believe in.
Rayan Drissi
CTO
Solan Després
CRO
Robin Morand
Lead Designer
Amine Latti
Full Stack & AI Engineer
S. M.
Lead System Architect
They trust us
What our clients say about us
« DIV brought our firm back to the highest level of security our clients expect, with data sovereignty pushed deep into the way we operate. We sleep a lot better at night. »
Partner at a law firm in Bordeaux
« Before DIV, I was working off a hard drive sitting on my desk. Today, we have a real encrypted collaborative platform, accessible anywhere, and without giving up an inch on confidentiality. The generational leap is huge. »
Notary
« We left a US-based solution to switch to DIV. Honestly, it feels great to see French builders deliver this level of quality and security. Our data stays at home, and the product has nothing to envy Big Tech. »
Lawyer
FAQ Drive
Frequently asked questions about DIV Drive.
Can you read my files?
Where is my data hosted?
Are you subject to the US Cloud Act?
Is DIV Protocol suitable for professions bound by professional secrecy?
Another question?
Our team will answer directlyReady to start
Join the sovereign ecosystem.
30 minutes with a team member: we show you the tool in real conditions and answer your security, IT and compliance constraints.





