Architecture and security
Memority relies on a trusted cloud infrastructure and a security-by-design approach to ensure performance, availability and regulatory compliance. Our 360° IAM platform combines technological innovation with the highest standards of data protection, enabling you to support your digital transformation with complete confidence.

A security-by-design approach across our IAM platform
Security at the core
Certifications and regulatory compliance
Memority is certified ISO 27001 (information security management) and ISO 27701 (personal data protection), and holds the AirCyber Gold certification for the aerospace sector. The platform is hosted on the trusted S3NS cloud, qualified SecNumCloud 3.2 for IaaS and PaaS services. Memority complies with the NIS2 European directive, the GDPR, and DORA (the latter two in its role as a data processor).
Security by design and DevSecOps
Security is embedded into the design of every platform feature. Our source code is systematically peer-reviewed and subjected to automated static (SAST) and dynamic (DAST) security analyses as part of our continuous integration pipeline. A dedicated risk assessment is maintained and updated annually, as well as for each major evolution of the platform.
In-depth protection and encryption
Memority’s architecture is structured into dedicated security zones, following a defense-in-depth approach. It incorporates multiple protection layers, including anti-DDoS mechanisms, firewalls, Web Application Firewalls (WAF) and hardened operating systems. All servers are encrypted at rest, while all internal and external data flows are encrypted in transit. Sensitive secrets are securely stored in restricted-access Hardware Security Modules (HSMs).
Continuous monitoring and proactive security management
An outsourced Security Operations Center (SOC) continuously monitors the platform in real time to detect and respond to intrusion attempts. Automated vulnerability scans are performed on a daily basis, and security patches are applied within strict timeframes, according to the level of criticality identified. A dedicated cyber incident response and crisis management plan is in place to ensure rapid containment, coordinated remediation and transparent communication with our customers.
Rigorous Access and Identity Management
We enforce the principles of least privilege and segregation of duties across the platform. All access is protected by Multi-Factor Authentication (MFA), and all privileged accounts are strictly nominative. Administrative access is secured through a VPN followed by a privileged access bastion, which records and traces all administrator actions. A quarterly review of accounts and access rights ensures that authorizations remain strictly aligned with business requirements.

Certifications and regulatory compliance
Memority is certified ISO 27001 (information security management) and ISO 27701 (personal data protection), and holds the AirCyber Gold certification for the aerospace sector. The platform is hosted on the trusted S3NS cloud, qualified SecNumCloud 3.2 for IaaS and PaaS services. Memority complies with the NIS2 European directive, the GDPR, and DORA (the latter two in its role as a data processor).

Security by design and DevSecOps
Security is embedded into the design of every platform feature. Our source code is systematically peer-reviewed and subjected to automated static (SAST) and dynamic (DAST) security analyses as part of our continuous integration pipeline. A dedicated risk assessment is maintained and updated annually, as well as for each major evolution of the platform.

In-depth protection and encryption
Memority’s architecture is structured into dedicated security zones, following a defense-in-depth approach. It incorporates multiple protection layers, including anti-DDoS mechanisms, firewalls, Web Application Firewalls (WAF) and hardened operating systems. All servers are encrypted at rest, while all internal and external data flows are encrypted in transit. Sensitive secrets are securely stored in restricted-access Hardware Security Modules (HSMs).

Continuous monitoring and proactive security management
An outsourced Security Operations Center (SOC) continuously monitors the platform in real time to detect and respond to intrusion attempts. Automated vulnerability scans are performed on a daily basis, and security patches are applied within strict timeframes, according to the level of criticality identified. A dedicated cyber incident response and crisis management plan is in place to ensure rapid containment, coordinated remediation and transparent communication with our customers.

Rigorous Access and Identity Management
We enforce the principles of least privilege and segregation of duties across the platform. All access is protected by Multi-Factor Authentication (MFA), and all privileged accounts are strictly nominative. Administrative access is secured through a VPN followed by a privileged access bastion, which records and traces all administrator actions. A quarterly review of accounts and access rights ensures that authorizations remain strictly aligned with business requirements.
The five technical pillars of Memority's strength
An innovative architecture
A single, modular platform
Memority’s three complementary offerings (MY-Identity, MY-Access and MY-Keys) are built on a shared technical foundation. This unified architecture makes it easy to activate new capabilities without complex implementation projects, as identities are already centralized within the platform. The result is greater agility, faster time to value and reduced integration costs.
Micro-services and cloud-native architecture
Our solution is built on a microservices-based architecture, with each business function encapsulated within a dedicated service. Deployed in orchestrated containers, these components simplify maintenance, accelerate release cycles and strengthen overall security. Memority leverages native cloud services from trusted providers such as AWS and S3NS to deliver optimal performance, scalability and reliability for our customers.
Optimized application-level multi-tenancy
Memority’s multi-tenant architecture enforces data isolation at the application level, rather than at the infrastructure layer. Each customer benefits from two distinct environments — production and non-production — delivering identical service levels and performance guarantees. This innovative approach ensures an optimal cost-to-performance ratio, making the platform equally well suited to large enterprises and mid-sized organizations.
High availability and resilience
The platform is systematically deployed across three active data centers within a single cloud region, ensuring maximum availability and service continuity. For customers with critical requirements, Memority offers a Disaster Recovery Plan (DRP) across another region — or even a different cloud provider — to eliminate any single point of failure.
Flexible and customizable architecture
Memority provides a high level of flexibility to meet diverse operational and regulatory requirements. Customers can choose their cloud provider (AWS, S3NS, GCP), hosting region (Paris, Dublin), and deployment model, including shared or dedicated environments. Additional options include the activation of a Disaster Recovery Plan (DRP) and log forwarding to your SOC. This modular approach enables organizations to tailor the infrastructure precisely to their regulatory, security and organizational constraints.

A single, modular platform
Memority’s three complementary offerings (MY-Identity, MY-Access and MY-Keys) are built on a shared technical foundation. This unified architecture makes it easy to activate new capabilities without complex implementation projects, as identities are already centralized within the platform. The result is greater agility, faster time to value and reduced integration costs.

Micro-services and cloud-native architecture
Our solution is built on a microservices-based architecture, with each business function encapsulated within a dedicated service. Deployed in orchestrated containers, these components simplify maintenance, accelerate release cycles and strengthen overall security. Memority leverages native cloud services from trusted providers such as AWS and S3NS to deliver optimal performance, scalability and reliability for our customers.

Optimized application-level multi-tenancy
Memority’s multi-tenant architecture enforces data isolation at the application level, rather than at the infrastructure layer. Each customer benefits from two distinct environments — production and non-production — delivering identical service levels and performance guarantees. This innovative approach ensures an optimal cost-to-performance ratio, making the platform equally well suited to large enterprises and mid-sized organizations.

High availability and resilience
The platform is systematically deployed across three active data centers within a single cloud region, ensuring maximum availability and service continuity. For customers with critical requirements, Memority offers a Disaster Recovery Plan (DRP) across another region — or even a different cloud provider — to eliminate any single point of failure.

Flexible and customizable architecture
Memority provides a high level of flexibility to meet diverse operational and regulatory requirements. Customers can choose their cloud provider (AWS, S3NS, GCP), hosting region (Paris, Dublin), and deployment model, including shared or dedicated environments. Additional options include the activation of a Disaster Recovery Plan (DRP) and log forwarding to your SOC. This modular approach enables organizations to tailor the infrastructure precisely to their regulatory, security and organizational constraints.
Our offers
Our reliable solutions secure every identity, every access, without compromise.

Governing identities
Manage identity lifecycle, automate right management and ensure compliant and agile governance integrated with your information system.

Secure user accesses
Secure and simplify access to applications with strong authentication, fluid SSO and risk-driven adaptive access control.

Manage second factors
Centralize, deploy and monitor your second authentication factors to guarantee security, compliance and seamless user experience.