
documents secured on DIV Drive
The sovereign drive for your most sensitive documents.
End-to-end encrypted storage, hosted in Europe, controlled by you alone. No data can be read by DIV Protocol or any third party.

DIV Drive
Stay in control of your data.
A familiar interface for your teams, a sovereign infrastructure for your company. Distributed storage in Europe, end-to-end encryption and built-in GDPR compliance.
Store and access your files, whatever their size, from anywhere, in a fully encrypted and end-to-end secure space.
How it works
With Drive, managing your data is simple.
Three steps. Your documents are encrypted, distributed, accessible everywhere and under your control.

You upload your files to Drive
From your computer or smartphone, drop your sensitive documents in a few clicks.
DIV Protocol encrypts and duplicates your files
Your files are encrypted end-to-end then distributed across several European datacenters.

You access them anywhere, fully secure
Only your authorized collaborators can read, sign, or share the documents.
Features
A professional interface, designed for your efficiency.
Every feature has been refined for teams working daily on sensitive documents.
01 · Storage
A clear file tree, so you never lose a file again.
Flexible and intuitive hierarchy, fast navigation, precise filtering and tags. Your teams find their bearings from day one.
Nested folders with no depth limit.
Size, last modified and owner indicators.
Drag-and-drop reorganization, without breaking permissions.

02 · Shared projects
A drive per project, roles tailored to each team.
Create a dedicated space for each mission, case, or client. Each project has its own tree, members and access policies. The right people see the right documents, nothing more.
Separate drives per project
Custom roles per workspace

03 · Sharing
Share with third parties, without email attachments.
Password, automatic expiration... Your clients and partners access your shares simply, without creating an account.
Download blocked or allowed depending on role.
Fast and secure delivery
04 · Collaboration
Work together without ever losing a version.
Simultaneous editing, real-time presence, version history. Everyone sees who edits what, and no one overwrites another's work.
Real-time presence.
Full history and restoration.
Comments and mentions



Our technology
A technological innovation serving your data
Distributed architecture, verifiable traceability, high availability.
Distributed architecture
Your files are fragmented and distributed across several sovereign French datacenters. No single point of failure.
High availability
99.9% contractual availability. Automatic encrypted replication. Validated continuity plan.
Verifiable traceability
Every action on your files is logged and cryptographically signed. Soon anchored on blockchain via DIV Check.
End-to-end encryption
Client-side AES-256. Your keys are generated and kept on your device or HSM. They never transit through our servers.
Zero-knowledge by design
Our architecture makes content access impossible, even for our technical team. Even under French or foreign legal requisition.
End-to-end encryption
Client-side AES-256. Your keys are generated and kept on your device or HSM. They never transit through our servers.
Distributed architecture
Your files are fragmented and distributed across several sovereign French datacenters. No single point of failure.
High availability
99.9% contractual availability. Automatic encrypted replication. Validated continuity plan.
Zero-knowledge by design
Our architecture makes content access impossible, even for our technical team. Even under French or foreign legal requisition.
Verifiable traceability
Every action on your files is logged and cryptographically signed. Soon anchored on blockchain via DIV Check.
FAQ Drive
Frequently asked questions about DIV Drive.
Can you read my files?
Where is my data hosted?
Are you subject to the US Cloud Act?
Is DIV Protocol suitable for professions bound by professional secrecy?
Another question?
Our team will answer directlyReady to start
Give your documents the sovereignty they deserve.
30 minutes with a team member: we show you the tool in real conditions and answer your security, IT and compliance constraints.