HEELONYS — Éditeur de Solutions de Santé Souveraine
✓ Digital sovereignty · Zero cloud · HDS · AES-256-GCM · Auditable open source

Sovereign Secrets Management for the Healthcare Ecosystem.

Hospitals, Clinics, Labs & Nursing Homes. HeelonVault secures critical EHR, HIS, HL7 and device credentials in a sovereign on-premise vault, natively compliant with HDS and GDPR, built in Rust.

Why choose HeelonVault?

Built for demanding teams, not for the mass market. No compromise on sovereignty.

Interested? Let us discuss your context.

Book a call

Our Sectors

HeelonVault is designed to meet the specific constraints of each segment of the healthcare ecosystem.

🏥

Hospitals & Clinics

EHR · HIS

Protect access to Hospital Information Systems and Electronic Health Records. Full traceability for HDS certification.

🧪

Laboratories

HL7 · Analyzers

Secure HL7 flows, API integration keys and analyzer access. Zero credential exposure in data pipelines.

🏠

Nursing Homes & Social Care

On-call · Care Record

Manage on-call access and authorizations for shared care records. Seamless access rotation without service disruption.

💊

Private Practices & Pharmacies

PMR · Software

Centralize access to PMR, pharmacy, practice management software and telemedicine platforms. Native GDPR compliance.

Interactive demo

Your Vault in Action

Explore HeelonVault through your healthcare business lens.

🔐
v1.2.4
CHU DEMO
ADMIN
Search a secret…
4
0
Search a secret…
Accès Orbis
ROBUSTE\u22650
Mots de passe
Admin ESXi
ROBUSTE\u22650
Clés SSH
Clé SSH NAS
ROBUSTE\u22650
Clés SSH
API PACS
MOYEN\u22650
Tokens API
Team:Astreinte NuitHDS ✓

Interactive simulation — local demo, no real data.

Want to go further?

Access the Experience Space to test our healthcare business scenarios (Hospital, Lab, EHPAD).

Unlock the Demo Space

Critical secrets and password management

A clear view for CIO and CISO teams: what you protect, how you govern it, and how you share it safely.

Credentials and passwords

  • Admin accounts, service accounts, application accounts
  • Simplified rotation and revocation
  • Full access traceability

API tokens and integration keys

  • CI/CD tokens, webhooks, and third-party integrations
  • Encrypted storage and role-based access
  • Lower exposure risk in scripts

SSH keys and certificates

  • Central inventory for critical keys
  • Usage controls and per-environment segmentation
  • Stronger compliance and audit readiness

Sensitive documents

  • Configuration files, runbooks, and operating procedures
  • Encrypted protection and action history
  • Access control by team and business need

Team vaults and shared access

Shared vaults per team

Create vaults for Finance, Ops, Infra, SOC, and Projects. Each team accesses only its scope.

Fine-grained roles

Read, write, administration: role-based assignment to prevent excessive privileges.

Controlled offboarding

Immediate, traceable access revocation without service disruption.

Product preview

Three key views of HeelonVault: authentication, operations, and audit evidence.

Login HeelonVault login page screenshot
Secure login page
Dashboard HeelonVault main page screenshot
Main dashboard and secrets management
Audit HeelonVault audit report screenshot
Audit report and traceability

Vault and password manager comparison

A factual comparison between spreadsheets, KeePass, SaaS cloud tools, and HeelonVault.

Key point

KeePass is local (therefore non-cloud), but it does not natively cover team governance, actionable audit reporting, and CIO-level oversight.

HeelonVault advantage

HeelonVault combines on-premise deployment, operational auditing, and auditable open-source code (Apache 2.0), with exportable reports for CISO and CIO teams.

CIO/CISO Criterion Excel KeePass SaaS Cloud HeelonVault
Data sovereignty Partial Good Low Maximum (on-premise)
HDS compliance No No Variable (contractual) Yes (on-premise architecture)
Actionable audit reporting No Limited Medium (vendor-dependent) Native + signed PDF report
Team governance High risk Complex Correct Designed for CIO/CISO
Source code auditability Not relevant Partial Impossible Yes (Apache 2.0)
Internet dependency No No Yes No (native offline)

CIO / CISO — Evaluate the full impact before deciding.

Read the CIO impact analysis

HeelonVault Pricing

Three service levels to secure your critical secrets, from self-managed adoption to enterprise-grade governance.

Community

Target: Technical teams operating independently

Pricing
Free
Support
Community support via GitHub
Features
  • Open-source code (Apache 2.0)
  • Centralized secrets and password management
  • On-premise deployment without mandatory cloud dependency
Limits
Self-managed updates and operations, no dedicated SLA
Request Community access
Most selected

Installation Pack

Target: Organizations needing guided production rollout

Pricing
EUR 1,500 setup fee (excl. tax)
Support
Email support within 48 business hours
Features
  • Initial deployment on your infrastructure
  • OS and network hardening
  • Go-live assistance and operational handover
Limits
Continuous maintenance and custom evolutions not included
Request Installation Pack

Serenity

Target: CIO/CISO teams with continuity and governance requirements

Pricing
Quote-based
Support
Premium support with contractual service commitments
Features
  • Reinforced updates, maintenance, and monitoring
  • Priority support and compliance enablement
  • Custom evolutions and technical audits on demand
Limits
Scope and capacity aligned with service contract
Discuss Serenity

Need alignment before choosing your service level?

We map your security, compliance, and operations context to recommend the service tier that fits your organization.

Book 30 min

This panel is ready to be reused on HeelonConnect to keep pricing communication consistent across products.

Compliance & GDPR

A clear trust framework for DPO, CISO, and compliance leadership teams.

On-premise by default

Your data remains inside your infrastructure.

Zero-knowledge architecture

HEELONYS cannot access any customer secret.

AES-256-GCM + Argon2id

Advanced protection aligned with market standards.

GDPR Art. 25 & 32

Privacy by Design and Security by Default.

Ready to simplify your daily workflow?

30 minutes to diagnose your lab flows and propose a modern alternative.

Why book a call?

  • 30-minute qualification call

    We quickly identify which solution best fits your operations, compliance, and integration context.

  • Prioritized action plan

    Leave with a practical roadmap for access governance, lab interoperability, or GED backend integration.

  • Field expert access

    25+ years of experience in critical healthcare systems and sensitive deployments.

Need a quick meeting? Direct link:

My calendar

GDPR protection: Turnstile verifies you are human. Read our policy.