• Case Study
  • Fidigit

Fidigit and Tinext Cloud: a path to digital transformation and advanced security

In recent years, digital transformation has become a priority for companies aiming to improve operational efficiency and ensure maximum data security. Fidigit SA, a company specialized in IT solutions for digitalization, chose Tinext Cloud as a strategic partner to modernize the infrastructure of the Fidinam Group.

From 2021 to 2023, the first phase of the project involved migrating from an on-premises data center to a hybrid cloud infrastructure, leveraging IaaS (Infrastructure-as-a-Service) and DRaaS (Disaster Recovery as a Service) solutions provided by Tinext Cloud.
This transition ensured business continuity, data security, and operational flexibility, while also enabling Fidigit to offer Cloud solutions to external clients.

A new security paradigm: Zero Trust

Starting in 2024, the project entered its second phase with a stronger focus on cybersecurity. The goal was to protect corporate data and regulate access to company resources for more than 300 users, including employees and external partners.

To address these cybersecurity challenges, Fidigit adopted a Zero Trust security model based on the principle of “never trust, always verify.” In this approach, no user or device is trusted by default—regardless of their role, location, or endpoint.

The Zero Trust framework has proven highly effective in protecting against advanced threats such as phishing, ransomware, and data breaches. It is also particularly well-suited for today’s work environments, where users access systems from various devices and locations.

The model is built on three core principles:

  • All entities are untrusted by default
  • Access is granted based on the principle of least privilege
  • Monitoring must be continuous, comprehensive, and immediate

Fidigit’s security infrastructure was redesigned to reflect these principles and to ensure secure, seamless access to corporate data and applications.
If a device fails to meet security policies—such as having outdated antivirus software, known vulnerabilities, or unusual login behavior—access to sensitive data is denied or restricted, minimizing risk exposure.

Following the Zero Trust approach, user behavior is monitored in real time. Risky actions are proactively blocked, such as downloading suspicious files, visiting malicious websites, using unverified devices, or sharing sensitive information.

Security controls are enforced at all levels to protect data across files, applications, and instant messaging platforms.

Real-world Zero Trust implementations

Here are two practical examples of how Zero Trust is applied within the Fidigit ecosystem:

  • Only users with a registered and managed endpoint that passes specific security checks (such as vulnerability scans and access policies) are granted access to company resources—whether on-site or remote.
  • Access does not rely on traditional VPNs (like SSL VPN or IPsec Mobile); instead, business services are securely exposed with advanced protections such as certificate-based authentication and encrypted communication.

As a result, every connection to corporate resources is authenticated, encrypted, logged, and continuously monitored—ensuring the highest level of security and control in real time.

2025: building a fully secure ecosystem

Fidigit’s digital transformation journey continues. In 2025, network interoperability has been further improved to enable even more granular and secure user activity monitoring.

This case study demonstrates how combining advanced security systems with a hybrid Cloud configuration can ensure operational efficiency, robust data protection, and business continuity.