1:"$Sreact.fragment" 2:I[58332,["5802","static/chunks/69b09407-70bdc05eb6800de1.js","2545","static/chunks/c16f53c3-905988bf7e1eb8e3.js","3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","6874","static/chunks/6874-ce2e36574b57795c.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","4014","static/chunks/4014-04ea03eb3cc7d664.js","2228","static/chunks/2228-5dc0590126ee6462.js","8483","static/chunks/8483-db2b13e614c3406f.js","6128","static/chunks/6128-2842f5cc97e33b84.js","7177","static/chunks/app/layout-797fd598531dad59.js"],"LanguageProvider"] 3:I[38536,["5802","static/chunks/69b09407-70bdc05eb6800de1.js","2545","static/chunks/c16f53c3-905988bf7e1eb8e3.js","3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","6874","static/chunks/6874-ce2e36574b57795c.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","4014","static/chunks/4014-04ea03eb3cc7d664.js","2228","static/chunks/2228-5dc0590126ee6462.js","8483","static/chunks/8483-db2b13e614c3406f.js","6128","static/chunks/6128-2842f5cc97e33b84.js","7177","static/chunks/app/layout-797fd598531dad59.js"],"CookieProvider"] 4:I[23250,["5802","static/chunks/69b09407-70bdc05eb6800de1.js","2545","static/chunks/c16f53c3-905988bf7e1eb8e3.js","3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","6874","static/chunks/6874-ce2e36574b57795c.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","4014","static/chunks/4014-04ea03eb3cc7d664.js","2228","static/chunks/2228-5dc0590126ee6462.js","8483","static/chunks/8483-db2b13e614c3406f.js","6128","static/chunks/6128-2842f5cc97e33b84.js","7177","static/chunks/app/layout-797fd598531dad59.js"],"default"] 5:I[87555,[],""] 6:I[31295,[],""] 8:I[59665,[],"MetadataBoundary"] a:I[59665,[],"OutletBoundary"] d:I[74911,[],"AsyncMetadataOutlet"] f:I[59665,[],"ViewportBoundary"] 11:I[26614,[],""] :HL["/_next/static/css/88a5fd708d1df835.css","style"] 0:{"P":null,"b":"z6fsvGJ1SceYE1hGCwm7q","p":"","c":["","en",""],"i":false,"f":[[["",{"children":[["lang","en","d"],{"children":["__PAGE__",{}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/88a5fd708d1df835.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L2",null,{"children":["$","$L3",null,{"children":["$","$L4",null,{"children":["$","$L5",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}]}]}]]}],{"children":[["lang","en","d"],["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":["$L7",["$","$L8",null,{"children":"$L9"}],null,["$","$La",null,{"children":["$Lb","$Lc",["$","$Ld",null,{"promise":"$@e"}]]}]]}],{},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","AVwI1cBJXohE_5ITrAg-N",{"children":[["$","$Lf",null,{"children":"$L10"}],null]}],null]}],false]],"m":"$undefined","G":["$11","$undefined"],"s":false,"S":true} 12:"$Sreact.suspense" 13:I[74911,[],"AsyncMetadata"] 15:I[18238,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"default"] 16:I[33063,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"Image"] 17:I[23379,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"default"] 18:I[68009,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"default"] 19:I[36130,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"default"] 1a:I[2485,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"default"] 1c:I[79807,["3063","static/chunks/3063-f5f381efbd04c33d.js","3011","static/chunks/3011-b4b10918fbd069c3.js","8774","static/chunks/8774-329dfe5cfba8a19c.js","2762","static/chunks/2762-77c7955d8135aeaf.js","2485","static/chunks/2485-b040190cc35f88a6.js","8483","static/chunks/8483-db2b13e614c3406f.js","911","static/chunks/app/%5Blang%5D/page-b521653283d7a8e1.js"],"default"] 9:["$","$12",null,{"fallback":null,"children":["$","$L13",null,{"promise":"$@14"}]}] 7:[["$","$L15",null,{"t":{"menu":{"home":"Home","features":"Features","solutions":"Solutions","you_are":"You are","resources":"Resources","company":"Who we are","blog":"Blog","contact_us":"Contact us","legal":"Legal","privacy":"Privacy policy","terms":"Terms of Use","notice":"Legal Notice","about":"About","media":"Media","support":"Support","downloads":"Downloads"},"hero":{"title":"Secure Remote Access\n Anywhere, Anytime","subtitle":"Chimere is a next-generation remote access solution based on Zero Trust Network Access that provides secure and private access to your applications and services.","cta":"Book a demo","cta2":"Contact us","announce":"Agentless version coming soon","schema":{"title":"Simplify your network access","header":"NextGen network access","description":"Legacy infrastructure are complex and difficult to manage. Chimere simplifies your network access by providing a modern, secure, and easy-to-use solution without single points of failure."},"clouds":{"title":"Hosted on sovereign cloud providers","description":"Chimere is hosted on sovereign cloud providers, ensuring data sovereignty and compliance with local regulations. We prioritize security and privacy by partnering with trusted providers like OVHcloud, Scaleway, and Outscale."},"stats":{"connections":"Connections secured every 24 hours","protocols":"Protocols supported","uptime":"Uptime last 365 days"},"feature_grid":{"header":"ZTNA","title":"Zero Trust Network Access and much more","feat1_title":"Software Defined Network","feat1_desc":"Define your network in a few clicks, create secure connections between your users and services, and manage your network policies with ease.","feat2_title":"Continuous security policy checks","feat2_desc":"Monitor in real time the compliance of users connected to your applications and block automaticaly non-compliant devices.","feat3_title":"State of the art security","feat3_desc":"Strong and multi-factor authentication, end-to-end encryption, and detailled logging are built-in features that ensure your services are always secure.","feat4_title":"User friendly","feat4_desc":"The connector is a simple and intuitive application that allows users to connect to their remote applications and services with ease."},"map":{"header":"Global network","title":"Over 25 points of presence worldwide","description":"Leverage a mesh network with more than 25 activable points of presence around the globe to optimize performance and stay as close as possible to your users."}},"support":{"title":"Our partners"},"description":"This page is for testing translations.","features":{"feature1":"Feature 1","discover":"Discover all features","discover_tagline":"Chimere combines simplicity, visibility, and power to transform the way your users access your organization’s resources.","posture_check":{"title":"Continuous posture check","subtitle":"Dynamicaly check user and device compliance","description":"The Zero Trust model emphasizes never trusting and always verifying.\n Chimere provides a set of rules to check whether the user and the device they are connecting with meet the required standards.","grid_title":"A panel of rules to match every needs","firewall":{"title":"Firewall state","description":"Check the firewall state of users connecting to your services."},"antivirus":{"title":"Antivirus compliance","description":"Cut off connections from users when a threat is detected and prevent those with disabled protection from connecting."},"geoloc":{"title":"Geolocation check","description":"Allow or block connections based on the user's geolocation."},"time":{"title":"Time check","description":"Allow or block connections based on the time of day."},"process":{"title":"Process allow-listing","description":"Allow only certain processes on the user's device to access your services."},"devices":{"title":"Device control","description":"Choose which devices, on which operating systems and versions are allowed to connect to your organization."}},"network_access":{"title":"Network access","subtitle":"Seamlessly connect to your secured services","description":"Zero Trust redefines how users access internal resources.\n Chimere establishes secure tunnels based on precise access rules, ensuring that each user can access only the services they are explicitly authorized to."},"passwordless_auth":{"title":"Passwordless authentication","subtitle":"Perform a strong authentication with MFA, without password needed","description":"Eliminate credential theft risks by combining passwordless login with multi-factor authentication (MFA).\n Chimere integrates with your identity provider to enforce secure and frictionless access."},"centralized_management":{"title":"Centralized management","subtitle":"Define, monitor, and control everything in one place","description":"Chimere offers a unified interface to manage users, access policies, compliance rules, and audit logs, simplifying administration across your entire infrastructure."},"detailed_logging":{"title":"Detailed logging","subtitle":"Track activity and diagnose issues with full visibility","description":"All user and service activity is logged in detail, giving your security teams the insight they need for audits, forensic analysis, and real-time monitoring."},"invisible_attack_surface":{"title":"Invisible attack surface","subtitle":"Do not expose ports, nor entry point to exploit","description":"Chimere eliminates the concept of a publicly reachable network.\n All traffic is initiated outbound by the agent, removing the need to expose any service to the internet, drastically reducing your attack surface."}},"you_are":{"ciso":{"title":"CIO and CISO","description":"Secure your IS and comply with regulations","catchup":"Chimere is helping CIOs and CISOs simplify security while reinforcing compliance and governance.","p1":"Chimere enables IT and security leaders to adopt a Zero Trust Network Access model that aligns with modern cybersecurity frameworks and compliance requirements. Gain visibility and enforce access policies dynamically, without increasing operational complexity. From posture checks to encrypted tunnels, Chimere is your ally in reducing risk, detecting anomalies, and ensuring that only compliant users access your most sensitive resources.","features":{"one":{"title":"Dynamic policy enforcement","description":"Define and update rules in real-time, ensuring adaptive protection for every user, service, and context."},"two":{"title":"Compliance & audit readiness","description":"Full traceability of access decisions and activity logs to meet regulatory and internal audit standards."},"three":{"title":"Risk-based access controls","description":"Use device posture, user identity, and behavior to determine access – not just credentials."}},"benefits":"With Chimere, CIOs and CISOs gain the strategic advantage of a Zero Trust model without friction. Our platform enhances compliance posture, reduces the attack surface, and simplifies governance by centralizing control and giving real-time visibility on users and assets. Say goodbye to VPN sprawl and legacy risks.","one_sentence":"Chimere helps IT leadership adopt Zero Trust confidently – increasing security, reducing complexity, and ensuring compliance."},"manager":{"title":"Business Manager","description":"Accelerate digital transformation of your company","catchup":"Chimere helps business leaders secure digital access while staying focused on agility, compliance, and operational efficiency.","p1":"In a world where security must no longer hinder productivity, Chimere brings a modern approach to cybersecurity: Zero Trust Network Access. Designed for today’s business challenges, it ensures data confidentiality, regulatory compliance, and business continuity — without adding complexity for your teams. Whether you're scaling, undergoing digital transformation, or facing compliance pressure, Chimere integrates quickly and delivers long-term peace of mind.","features":{"one":{"title":"Seamless security for hybrid teams","description":"Protect access to your applications — even remotely — without compromising the user experience."},"two":{"title":"Built-in compliance from day one","description":"Meet regulatory standards (NIS2, GDPR, ISO 27001...) with full traceability and fine-grained access control policies."},"three":{"title":"Centralized control with a unified view","description":"Monitor all access and risks in real time through a clear interface, independent of your existing infrastructure."}},"benefits":"Chimere helps business leaders turn cybersecurity into a lever of trust and performance. By delivering continuous protection, reducing your attack surface, and meeting compliance demands, you strengthen your organization’s credibility with clients, partners, and investors. Focus on what drives your business — knowing that your critical access points are under control.","one_sentence":"Chimere empowers business leaders to secure their organization intelligently — without slowing operations or innovation."},"administrator":{"title":"Network and cloud administrator","description":"Provide simple and secure access to your services","catchup":"Chimere empowers your infrastructure teams to simplify access control and reduce operational burden.","p1":"Chimere replaces patchwork VPNs and manual network segmentation with a software-defined, policy-based ZTNA solution. Provision access in minutes, monitor user sessions in real-time, and isolate services securely without exposing the internal network. Whether you're running on-prem or hybrid cloud, Chimere adapts to your environment with minimal configuration and zero trust principles built-in.","features":{"one":{"title":"Software-Defined Perimeter","description":"Connect users to services without exposing the network. Only what’s authorized is reachable."},"two":{"title":"Granular access rules","description":"Control who can access what, when, and from which device, with precise conditions."},"three":{"title":"Multi-cloud native","description":"Deploy Chimere easily across cloud providers and data centers, with a consistent policy layer."}},"benefits":"Admins save time and reduce errors with centralized rule management and automated compliance checks. Chimere cuts down support tickets, simplifies onboarding, and eliminates the need to reconfigure firewalls or VPN gateways. You stay in control, while users stay productive.","one_sentence":"Chimere gives cloud and network teams powerful tools to secure access, automate enforcement, and scale with confidence."},"mssp":{"title":"MSSP","description":"Bring value to your clients and reduce your team's workload","catchup":"Chimere partners with MSSPs to deliver high-value secure access services to their customers.","p1":"Chimere is the ideal solution for MSSPs looking to offer ZTNA as-a-Service without technical complexity. With a native multi-tenant architecture, you can manage multiple clients from a dedicated interface while ensuring strict isolation of their data and security policies. Benefit from centralized supervision (coming soon), unified license management, and a lightweight multi-client connector that’s easy to deploy. Chimere becomes a growth lever, enabling you to expand your service offering without increasing operational overhead.","features":{"one":{"title":"Built-in Multi-Tenant Isolation","description":"Easily isolate each client within a secure and unified control plane. Chimere ensures strict separation of data and policies, while providing a unique multi-tenant connector."},"two":{"title":"Unified Supervision Platform (coming soon)","description":"Monitor all your customers from a single centralized interface, with unified management of access, logs, and licenses — for greater operational efficiency and profitability."},"three":{"title":"High-Value Service Offering","description":"Offer your customers high-value services such as integration, managed support, and compliance assistance. Chimere provides the infrastructure — you own the relationship and the margins."}},"benefits":"With Chimere, MSSPs streamline operations while delivering higher-value managed services. Reduce client risk, simplify secure access, and deliver measurable outcomes with a modern ZTNA platform that integrates with your existing stack and billing models.","one_sentence":"Chimere empowers MSSPs to deliver scalable, profitable, and production-ready Zero Trust services."}},"resources":{"title":"Learn about Chimere and ZTNA","desc":"Discover key concepts, best practices, and real-world use cases to better understand Zero Trust and how Chimere fits into your security architecture.","ztna_vs_vpn":{"header":"ZTNA vs VPN","title":"What are the differences between VPN and ZTNA?","description":"The VPN (Virtual Private Network) and ZTNA (Zero Trust Network Access) are two technologies used to secure access to IT resources. The VPN, combined with the firewall, is still considered state of the art in some companies. However, ZTNA is beginning to gain a choice spot thanks to its different and more adapted approaches to current threats."},"chimere_nis2":{"header":"NIS 2","title":"How can Chimere facilitate compliance with the NIS 2 Directive?","description":"Chimere can support your compliance with the NIS 2 directive by securing access to critical systems. This security is achieved through strict identity-based control and the principle of least privilege. Chimere continuously verifies each connection, limiting access to sensitive resources and mitigating risks from internal and external threats.","strubel_quote":"“The requirements of the European directive invite many entities to build a solid roadmap to deploy and strengthen their cyber defense capabilities, aiming for a structurally safer operation, increased trust with their stakeholders, and greater competitiveness for companies.”","strubel_title":"Managing Director of ANSSI","what_is":{"title":"The NIS 2 Directive overview","p1":"The NIS2 Directive (Network and Information Security Directive) is a legislative framework from the European\n Union aimed at strengthening cybersecurity requirements for critical infrastructures and essential services in Europe.\n In response to evolving cyber threats, it broadens its scope to more sectors and mandates stricter protective measures:","p2":{"p1":{"title":"Robust technical measures.","desc":"NIS 2 requires organizations to implement appropriate and proportionate technical and organizational security measures, such as encryption, system integrity checks, and network segmentation."},"p2":{"title":"Access management.","desc":"Organizations must enforce strict identity and access management controls, including multi-factor authentication and role-based access restrictions, to ensure only authorized users can access critical systems and data."},"p3":{"title":"Rapid response to security incidents.","desc":"Entities covered by NIS 2 are required to detect, report, and respond to cybersecurity incidents swiftly. This includes having incident response plans, detection tools, and processes for immediate containment and recovery."},"p4":{"title":"Enhanced control of suppliers and subcontractors.","desc":"Organizations must assess the cybersecurity posture of third-party providers and implement contractual safeguards to ensure supply chain security and regulatory compliance."}},"p3":"The goal is to increase resilience against cyber threats and ensure adequate protection of essential networks and services.","link1":"The NIS 2 Directive | ANSSI","link2":"Directive (EU) 2022/2555 on EUR-Lex"}},"chimere_ztna":{"header":"Chimere","title":"Why Chimere ZTNA?","description":"Today, dozens of ZTNA solutions exist. So why choose Chimere ZTNA?","quote":"“In 2024, ANSSI\n has also observed the amplified exploitation of\n vulnerabilities affecting devices exposed on the\n Internet – including security devices implemented\n by countless entities as a means to secure remote\n access to the IS (e.g. firewalls or VPN gateways).\n Over the past year, ANSSI was notified of the\n compromise of thousands of edge devices across\n France and processed dozens of security incidents\n linked to the exploitation of software vulnerabilities\n on these devices, which represent prime targets for attackers”","quote_author":"French Cybersecurity Agency (ANSSI)","quote_source":"Cyber Threat Overview 2024","quote_link":"https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-004/"},"ztna":{"title":"What is ZTNA?","description":"ZTNA, or Zero Trust Network Access, is a security model based on a fundamental principle: never trust by default, always verify. Unlike traditional perimeter security approaches, ZTNA assumes that the network is inherently compromised or vulnerable, and that every user, device, and application must be continuously authenticated, authorized, and monitored."}},"announces":{"title":"Announces","desc":"Latest anounces from Chimere"},"download":{"title":"Downloads","download":"Download","all":"All versions available","other":"Other versions","header":"Chimere Agent","subtitle":"Get the Chimere Agent for your device.","ua":"User Agent","ua_desc":"Use the Chimere User Agent to connect to your organisation and services.","ta":"Transfer Agent","ta_desc":"Use the Chimere Transfer Agent to secure services.","ua_mobile":"Mobile User Agent","ua_mobile_desc":"Use the Chimere User Agent on your mobile device to connect to your organisation and services."},"company":{"mission":"On a mission for a simpler and more secure network","subtitle":"Our mission and story","our_company":"Our company is built on the conviction that secure access should be simple, invisible, and effective. Chimere empowers organizations to adopt Zero Trust by providing a seamless, scalable solution that protects users and resources — without compromising on usability.","we_believe":"We strongly believe that the future of cybersecurity lies in simplicity, transparency, and continuous adaptation. Security should no longer be a barrier but an enabler — empowering teams to work freely while ensuring that access remains controlled, observable, and compliant. Our mission is to give organizations the tools they need to protect what matters, while keeping control firmly in their hands.","story":"Launched in late 2019 by Guillaume-Alexandre and Gabriel, Chimere is a French start-up that offers a new approach to cybersecurity. After 2 years of incubation within the Thales group, Chimere by Thales became a spin-off of Thales to accelerate its growth and forge its own path.","numbers":"The numbers","years":"Years old","our_values":"Our values","esg":{"engage":{"title":"Our ESG commitment","p1":"At Chimere, social and environmental responsibility is at the core of our mission. As a startup specialized in secure access technologies, we embrace a responsible approach in both the design of our solutions and our daily operations.","p2":"We promote eco-design in software to reduce the environmental footprint of our products, encourage remote work and local hosting to minimize travel and support sovereign digital infrastructures.","p3":"We are also committed to ethical and inclusive digital practices, ensuring data security, transparency in our operations, and accessibility of our technologies.","p4":"Chimere is part of a sustainable dynamic, at the intersection of cybersecurity, digital sovereignty, and positive social impact."},"rfar":"The Responsible Supplier Relations and Procurement Charter","rfar_desc":"Chimere is a signatory of the Responsible Supplier Relations and Procurement Charter (RFAR), demonstrating its commitment to balanced, sustainable, and responsible relationships with partners and suppliers.","rfar_link":"The charter RFAR on economie.gouv.fr (in French)"},"qsn":"Chimere is an associate member of Qorum Secur’Num, the first collective force of French cybersecurity SMEs and entrepreneurs."},"blog":{"title":"Latest publications","page_title":"Blog","description":"Latest news, insights, and trends on Zero Trust and cybersecurity.","related":"Related","back_latest":"Back to latest"},"contact":{"title":"Get in touch","description":"We'd love to hear from you! Whether you have questions, feedback, or just want to say hello, feel free to reach out."},"cta":{"title":"Ready to dive in?","title2":"Start your free trial today.","description":"See how Chimere secures remote access, simplifies compliance, and gives you full control, in minutes.","cta":"Book a demo","cta2":"Contact us","cta3":"Receive the one-pager by email","cta3_short":"One-pager"},"medias":{"title":"Brand and communication","description":"Download graphic resources and branding materials to communicate about Chimere","words":"Chimere in a few words","setences":"Chimere in a few sentences","g_resources":"Graphic resources","dl_g_resources":"Download compressed archive"},"agenda":{"description":"Explore the upcoming events where Chimere will be present — we’d love to meet you!","past":"Past events where Chimere was present."},"bottom_banner":{"title":"Mediterranean Cybersecurity Forum","description":"Join us in Marseille on June 26","link":"https://laplateforme.io/forum-mediterraneen-de-la-cybersecurite/"},"footer":{"title":"Next-generation remote access solution based on Zero Trust Network Access that provides secure and private access to your applications and services."},"cookies":{"title":"No cookies here!","description":"We love to eat cookies... but not the ones on websites!"},"forms":{"first_name":"First name","last_name":"Last name","company":"Company","position":"Position","email":"Email","message":"Message","slot1":"1st time slot","slot2":"2nd time slot","slot3":"3rd time slot","tz":"Timezone","availabilities":"To help us schedule the demonstration, please suggest at least two available time slots. Allow approximately 45 minutes.","demo_message_helper":"Tell us a bit about your context and what you're interested in with Chimere, so we can prepare a tailored demonstration.","privacy":"I accept to receive your emails and confirm that I have read your privacy policy and legal notices.","send":"Send message","send_ok":"Sent !","send_ok_message":"Your message has been successfully sent, and we thank you for it.","send_ok_button":"Go back","cancel":"Cancel","receive":"Send me the one-pager","send_warn":"Oops, it looks like there's a problem...","send_warn_message":"It seems your message didn’t reach us. You can email us at contact@chimere.eu","sending_progress":"Sending in progress..."},"captcha":{"change":"Change question","wrong":"Wrong captcha!"},"utils":{"read_more":"Read more","soon":"Available soon","back":"Back","register":"Register"}}}],["$","div",null,{"className":"bg-white py-24 sm:py-32","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 lg:px-8","children":[["$","h2",null,{"className":"text-center text-lg/8 font-semibold text-gray-900","children":"Our partners"}],["$","div",null,{"className":"mx-auto mt-10 grid max-w-lg grid-cols-4 items-center gap-x-8 gap-y-10 sm:max-w-xl sm:grid-cols-6 sm:gap-x-10 lg:mx-0 lg:max-w-none lg:grid-cols-5","children":[["$","$L16",null,{"alt":"EMSE","src":"/images/supports/Logo_Mines_Saint-Etienne.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"CampusCyber","src":"/images/supports/logo-campus-cyber-regionsud-1.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"RegionSud","src":"/images/supports/RegionSud.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"Logo_France_2030","src":"/images/supports/Logo_France_2030.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"EUCoFunded","src":"/images/supports/EUCoFunded.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"Thales","src":"/images/supports/Thales.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"aktantis","src":"/images/supports/aktantis.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"Systematic","src":"/images/supports/Systematic.jpg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"pec-logo-original","src":"/images/supports/pec-logo-original.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}],["$","$L16",null,{"alt":"QORUMSNHorizontal","src":"/images/supports/QORUMSNHorizontal.svg","width":100,"height":200,"className":"col-span-2 max-h-12 w-full object-contain lg:col-span-1"}]]}]]}]}],["$","$L17",null,{"t":"$7:0:props:t"}],["$","$L18",null,{"t":"$7:0:props:t"}],["$","div",null,{"className":"bg-white py-24 sm:py-32","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 lg:px-8","children":["$","div",null,{"className":"grid grid-cols-1 items-center gap-x-8 gap-y-16 lg:grid-cols-2","children":[["$","div",null,{"className":"mx-auto w-full max-w-xl lg:mx-0","children":[["$","h2",null,{"className":"text-4xl font-semibold tracking-tight text-pretty text-gray-900 sm:text-5xl","children":"Hosted on sovereign cloud providers"}],["$","p",null,{"className":"mt-6 text-lg/8 text-gray-600","children":"Chimere is hosted on sovereign cloud providers, ensuring data sovereignty and compliance with local regulations. We prioritize security and privacy by partnering with trusted providers like OVHcloud, Scaleway, and Outscale."}]]}],["$","div",null,{"className":"mx-auto w-full flex max-w-xl flex-col items-center gap-y-12 sm:gap-y-14 lg:mx-0 lg:max-w-none lg:pl-8","children":[["$","$L16",null,{"alt":"ovhcloud","src":"/images/clouds/ovhcloud.svg","width":200,"height":100,"className":"max-h-12 object-contain object-left"}],["$","$L16",null,{"alt":"scaleway","src":"/images/clouds/scaleway.svg","width":200,"height":100,"className":"max-h-12 object-contain object-left"}],["$","$L16",null,{"alt":"outscale","src":"/images/clouds/outscale.webp","width":200,"height":100,"className":"max-h-12 object-contain object-left"}]]}]]}]}]}],["$","$L19",null,{"t":"$7:0:props:t"}],["$","div",null,{"className":"bg-white py-24 sm:py-32","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 lg:px-8","children":["$","dl",null,{"className":"grid grid-cols-1 gap-x-8 gap-y-16 text-center lg:grid-cols-3","children":[["$","div","1",{"className":"mx-auto flex max-w-xs flex-col gap-y-4","children":[["$","dt",null,{"className":"text-base/7 text-gray-600","children":"Connections secured every 24 hours"}],["$","dd",null,{"className":"order-first text-3xl font-semibold tracking-tight text-gray-900 sm:text-5xl","children":"100 000 +"}]]}],["$","div","2",{"className":"mx-auto flex max-w-xs flex-col gap-y-4","children":[["$","dt",null,{"className":"text-base/7 text-gray-600","children":"Protocols supported"}],["$","dd",null,{"className":"order-first text-3xl font-semibold tracking-tight text-gray-900 sm:text-5xl","children":"5 000 +"}]]}],["$","div","3",{"className":"mx-auto flex max-w-xs flex-col gap-y-4","children":[["$","dt",null,{"className":"text-base/7 text-gray-600","children":"Uptime last 365 days"}],["$","dd",null,{"className":"order-first text-3xl font-semibold tracking-tight text-gray-900 sm:text-5xl","children":"99.99%"}]]}]]}]}]}],["$","$L1a",null,{"t":"$7:0:props:t"}],"$L1b",["$","$L1c",null,{"t":"$7:0:props:t","lang":"en"}],"$L1d"] c:null 1d:["$","script",null,{"type":"application/ld+json","dangerouslySetInnerHTML":{"__html":"{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"Corporation\",\"name\":\"Chimere\",\"url\":\"https://chimere.eu/en/\",\"logo\":\"https://chimere.eu/icon_chimere_color.png\",\"sameAs\":[\"https://www.linkedin.com/company/chimere-cyberstealth/\",\"https://chimere.eu/\"]},{\"@type\":\"WebPage\",\"name\":\"Chimere - Secure Remote Access Anywhere, Anytime\",\"description\":\"Chimere is a Zero Trust Network Access solution that provides secure access to applications and data without the need for traditional VPNs.\",\"url\":\"https://chimere.eu/en/\"},{\"@type\":\"WebSite\",\"name\":\"Chimere\",\"url\":\"https://chimere.eu/\"},{\"@type\":\"BreadcrumbList\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":{\"@type\":\"WebPage\",\"id\":\"https://chimere.eu/en/\",\"name\":\"Home\",\"url\":\"https://chimere.eu/en/\"}}]}]}"}}] 1b:["$","div",null,{"className":"bg-white py-24 sm:py-32","children":["$","div",null,{"className":"mx-auto max-w-7xl px-6 lg:px-8","children":[["$","div",null,{"className":"mx-auto max-w-2xl text-center","children":[["$","h2",null,{"className":"text-4xl font-semibold tracking-tight text-balance text-gray-900 sm:text-5xl","children":"Latest publications"}],["$","p",null,{"className":"mt-2 text-lg/8 text-gray-600","children":"Latest news, insights, and trends on Zero Trust and cybersecurity."}],["$","br",null,{}],["$","a",null,{"href":"/en/blog/","className":"text-sm/6 font-semibold text-chimere-600","children":["Read more"," ",["$","span",null,{"aria-hidden":"true","children":"→"}]]}]]}],["$","div",null,{"className":"mx-auto mt-16 grid max-w-2xl grid-cols-1 gap-x-8 gap-y-20 lg:mx-0 lg:max-w-none lg:grid-cols-3","children":[["$","article","zero-trust-network-access-imt",{"className":"flex flex-col items-start","children":[["$","div",null,{"className":"relative w-full","children":[["$","img",null,{"alt":"","src":"/images/blog/Chimere-IMT-Cybermoi-s.png","className":"aspect-video w-full rounded-2xl bg-gray-100 object-cover sm:aspect-2/1 lg:aspect-3/2"}],["$","div",null,{"className":"absolute inset-0 rounded-2xl ring-1 ring-gray-900/10 ring-inset"}]]}],["$","div",null,{"className":"max-w-xl","children":[["$","div",null,{"className":"mt-8 flex items-center gap-x-4 text-xs","children":[["$","time",null,{"dateTime":"2024-10-29","className":"text-gray-500","children":"October 29, 2024"}],["$","a",null,{"className":"relative z-10 rounded-full bg-gray-50 px-3 py-1.5 font-medium text-gray-600 hover:bg-gray-100","children":"News"}]]}],["$","div",null,{"className":"group relative","children":[["$","h3",null,{"className":"mt-3 text-lg/6 font-semibold text-gray-900 group-hover:text-gray-600","children":["$","a",null,{"href":"/en/blog/2024/10/29/zero-trust-network-access-imt","children":[["$","span",null,{"className":"absolute inset-0"}],"Zero Trust Network Access : Accès distant nouvelle génération ?"]}]}],["$","p",null,{"className":"mt-5 line-clamp-3 text-sm/6 text-gray-600","children":"Le Zero-Trust Network Access propose une vision nouvelle de l'accès distant au réseau d'entreprise."}]]}],["$","div",null,{"className":"relative mt-8 flex items-center gap-x-4","children":[["$","img",null,{"alt":"","src":"/images/people/gacg.png","className":"size-10 rounded-full bg-gray-100"}],["$","div",null,{"className":"text-sm/6","children":[["$","p",null,{"className":"font-semibold text-gray-900","children":["$","a",null,{"children":[["$","span",null,{"className":"absolute inset-0"}],"Guillaume-Alexandre Chaizy"]}]}],["$","p",null,{"className":"text-gray-600","children":"CEO @ Chimere"}]]}]]}]]}]]}],["$","article","bypassing-internal-firewalls",{"className":"flex flex-col items-start","children":[["$","div",null,{"className":"relative w-full","children":[["$","img",null,{"alt":"","src":"/images/blog/broken_firewall_201024.webp","className":"aspect-video w-full rounded-2xl bg-gray-100 object-cover sm:aspect-2/1 lg:aspect-3/2"}],["$","div",null,{"className":"absolute inset-0 rounded-2xl ring-1 ring-gray-900/10 ring-inset"}]]}],["$","div",null,{"className":"max-w-xl","children":[["$","div",null,{"className":"mt-8 flex items-center gap-x-4 text-xs","children":[["$","time",null,{"dateTime":"2024-10-21","className":"text-gray-500","children":"October 21, 2024"}],["$","a",null,{"className":"relative z-10 rounded-full bg-gray-50 px-3 py-1.5 font-medium text-gray-600 hover:bg-gray-100","children":"Articles"}]]}],["$","div",null,{"className":"group relative","children":[["$","h3",null,{"className":"mt-3 text-lg/6 font-semibold text-gray-900 group-hover:text-gray-600","children":["$","a",null,{"href":"/en/blog/2024/10/21/bypassing-internal-firewalls","children":[["$","span",null,{"className":"absolute inset-0"}],"Bypassing a local firewall"]}]}],["$","p",null,{"className":"mt-5 line-clamp-3 text-sm/6 text-gray-600","children":"Two common attack methods to bypass firewall rules and discover services"}]]}],["$","div",null,{"className":"relative mt-8 flex items-center gap-x-4","children":[["$","img",null,{"alt":"","src":"/images/people/gla.png","className":"size-10 rounded-full bg-gray-100"}],["$","div",null,{"className":"text-sm/6","children":[["$","p",null,{"className":"font-semibold text-gray-900","children":["$","a",null,{"children":[["$","span",null,{"className":"absolute inset-0"}],"Gabriel Ladet"]}]}],["$","p",null,{"className":"text-gray-600","children":"CTO @ Chimere"}]]}]]}]]}]]}],["$","article","starting-zero-trust",{"className":"flex flex-col items-start","children":[["$","div",null,{"className":"relative w-full","children":[["$","img",null,{"alt":"","src":"/images/blog/old_lockers_111024.webp","className":"aspect-video w-full rounded-2xl bg-gray-100 object-cover sm:aspect-2/1 lg:aspect-3/2"}],["$","div",null,{"className":"absolute inset-0 rounded-2xl ring-1 ring-gray-900/10 ring-inset"}]]}],["$","div",null,{"className":"max-w-xl","children":[["$","div",null,{"className":"mt-8 flex items-center gap-x-4 text-xs","children":[["$","time",null,{"dateTime":"2024-10-11","className":"text-gray-500","children":"October 11, 2024"}],["$","a",null,{"className":"relative z-10 rounded-full bg-gray-50 px-3 py-1.5 font-medium text-gray-600 hover:bg-gray-100","children":"Articles"}]]}],["$","div",null,{"className":"group relative","children":[["$","h3",null,{"className":"mt-3 text-lg/6 font-semibold text-gray-900 group-hover:text-gray-600","children":["$","a",null,{"href":"/en/blog/2024/10/11/starting-zero-trust","children":[["$","span",null,{"className":"absolute inset-0"}],"How to start implementing Zero Trust?"]}]}],["$","p",null,{"className":"mt-5 line-clamp-3 text-sm/6 text-gray-600","children":"What are the prerequisites and where to start for a Zero Trust strategy?"}]]}],["$","div",null,{"className":"relative mt-8 flex items-center gap-x-4","children":[["$","img",null,{"alt":"","src":"/images/people/gla.png","className":"size-10 rounded-full bg-gray-100"}],["$","div",null,{"className":"text-sm/6","children":[["$","p",null,{"className":"font-semibold text-gray-900","children":["$","a",null,{"children":[["$","span",null,{"className":"absolute inset-0"}],"Gabriel Ladet"]}]}],["$","p",null,{"className":"text-gray-600","children":"CTO @ Chimere"}]]}]]}]]}]]}]]}]]}]}] 10:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] b:null 14:{"metadata":[["$","title","0",{"children":"Chimere - Secure Remote Access Anywhere, Anytime"}],["$","meta","1",{"name":"description","content":"Chimere is a Zero Trust Network Access solution that provides secure access to applications and data without the need for traditional VPNs."}],["$","link","2",{"rel":"manifest","href":"/manifest.json","crossOrigin":"$undefined"}],["$","meta","3",{"name":"keywords","content":"Chimere - Secure Remote Access Anywhere, Anytime"}],["$","link","4",{"rel":"canonical","href":"https://chimere.eu/en/"}],["$","link","5",{"rel":"alternate","hrefLang":"fr","href":"https://chimere.eu/fr/"}],["$","link","6",{"rel":"alternate","hrefLang":"en","href":"https://chimere.eu/en/"}],["$","meta","7",{"property":"og:title","content":"Chimere - Secure Remote Access Anywhere, Anytime"}],["$","meta","8",{"property":"og:description","content":"Chimere is a Zero Trust Network Access solution that provides secure access to applications and data without the need for traditional VPNs."}],["$","meta","9",{"property":"og:image","content":"https://chimere.eu/images/og-images/og-images-tagline-en.webp"}],["$","meta","10",{"property":"og:image:width","content":"1280"}],["$","meta","11",{"property":"og:image:height","content":"720"}],["$","meta","12",{"property":"og:image:alt","content":"Chimere - Secure Remote Access Anywhere, Anytime"}],["$","meta","13",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","14",{"name":"twitter:title","content":"Chimere - Secure Remote Access Anywhere, Anytime"}],["$","meta","15",{"name":"twitter:description","content":"Chimere is a Zero Trust Network Access solution that provides secure access to applications and data without the need for traditional VPNs."}],["$","meta","16",{"name":"twitter:image","content":"https://chimere.eu/images/og-images/og-images-tagline-en.webp"}],["$","link","17",{"rel":"shortcut icon","href":"/favicon_color.ico","type":"image/x-icon"}],["$","link","18",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"48x48"}],["$","link","19",{"rel":"icon","href":"/favicon_color.ico","type":"image/x-icon"}]],"error":null,"digest":"$undefined"} e:{"metadata":"$14:metadata","error":null,"digest":"$undefined"}