S solutions P products R research A about Meet us · 5-7 rue Bellini 92800, FR
pragmable://about — bespoke editor of cloud security software · est. 2023

Pragmatic cybersecurity
software house.
We publish our own products.
We build the ones you can't buy.

Pragmable is a Paris-based cybersecurity editor. We publish our own products — flagship: Whocan — and we build bespoke security software for regulated operators whose problems no off-the-shelf tool can touch. Two modes, one discipline.

● PRODUCTS · WE PUBLISH

Software we ship to everyone.

Authorization tooling for the cloud, sold under the Pragmable brand. Whocan is in private beta with early operators; a second product in early design partnership. Free tier, paid tier, on-prem option on the roadmap.

→ explore our products prag-01 private beta · prag-02 in design
● BESPOKE · WE BUILD FOR YOU

Software we build with you.

You bring the hard problem — a regulator deadline, a custom IAM graph, an internal framework no vendor will touch. We bring engineers who've shipped secure cloud systems for banks, telcos, and critical infrastructure. We co-design, we build, we hand it back.

→ engagement models co-design · custom build · operate
§00 — FROM THE FOUNDERS
TO: CISOs, security architects, regulators
FROM: the founders, Paris
RE: what kind of company Pragmable is

Most security vendors decide what you need before they meet you. We are the opposite.

We started Pragmable because the institutions that most need serious cloud security tooling — private banks, telcos, healthcare networks, defense suppliers — are the ones least served by a generic SaaS dashboard. Their environments are too specific, their regulators too demanding, their data residency too sensitive.

So we built two engines under one roof. Products, where we take a problem we see across the industry and ship a single, opinionated tool — that's Whocan. And bespoke builds, where a customer brings us a problem nobody else will touch, and we bring the heavy tech: source-level ingestion pipelines, custom policy engines, on-prem evaluators, sovereign-cloud distributions, formal-verification components.

Both paths share the same discipline. We listen first. We build at the source. We sign the code. We never ship performative security.

S. Bucquet
Co-founder, CEO
signed · Paris, IXᵉ
§01 — HEAVY TECH

What we build with.

→ full capability map
§ I · AUTHORIZATION ENGINES

Custom policy evaluators at the source.

Six-layer chain evaluators, ABAC graph systems, policy-as-code compilers, condition-key coverage — built bespoke when off-the-shelf can't cover your model.

WASMDatalogSMTOPA
§ II · DETECTION & GRAPH

IAM graph & behavioral detection pipelines.

Continuous re-evaluation pipelines, blast-radius simulators, deviation detectors — built on streaming infra that scales to millions of principals.

WASMKafkaClickHouseNeo4j
§ III · SOVEREIGN INFRA

On-prem & SecNumCloud distributions.

Air-gapped builds, SecNumCloud-ready packaging, HDS-compatible deployments. Ship security tooling to environments that cannot phone home.

OVHcloudOutscaleS3NSOpenShift
§ IV · FORMAL METHODS

Provable policy correctness.

SMT-backed policy verification, model-checked authorization rules, machine-checked invariants. For environments where "we tested it" isn't a defense.

Z3TLA+CoqDafny
§ V · LANGUAGES & DSLs

Domain-specific query languages.

RQL was our first. We've designed and shipped three more for clients — compliance DSLs, audit query languages, configuration grammars. Compiler-grade.

Tree-sitterLALRPOPLSPWASM
§02 — ENGAGEMENT MODELS

How we work with you.

→ detailed scoping

All three modes share one constant: we own the build's security, quality, and fix lifecycle ourselves. No offshore patches. No third-party hand-offs. Residency follows your workload — EU, US, on-prem, or sovereign-cloud / SecNumCloud-ready.

▸ MODE 01

Co-design sprint.

4–6 weeks. We sit alongside your security architects to scope the problem, model the threat surface, and produce a written technical specification — buildable by us or by your team. No code commitment.

Duration: 4–6 weeks Output: spec + RFC Team: 1 architect Owned: design & review
▸ MODE 02

Bespoke build.

3–9 months. We build the system end-to-end: architecture, code, tests, deployment. Source code is yours under perpetual license. We can hand it off, or we can stay on for operations.

Duration: 3–9 months Output: production system Team: 2–4 engineers Owned: code · security · fixes
▸ MODE 03

Build & operate.

12+ months. We build the system and run it for you — SLA, on-call, continuous evolution. You stay the data controller; we stay the engineering team. Residency follows your workload.

Duration: 12+ months Output: managed service Team: dedicated Owned: end-to-end · in-house
§04 — THESIS

Four principles we hold to be true.

→ the long form
§ I · PRAGMATIC

Pragmatic by name and method.

We build for the threat in front of us, not the dashboard we'd like to sell. Every tool we ship answers a question a security architect actually asks. The name is the discipline.

§ II · SECURE

Built secure. Operated secure.

Provenance-signed builds, reproducible artefacts, hosting that follows the workload. We own every fix ourselves — no offshore patches, no third-party rotations on our own advisories.

§ III · HONEST

If we don't know, we say so.

We surface ugly answers plainly — even when they cost us the deal. Every advisory and every commit is signed by a named engineer. If we are wrong, you know by whom.

§ IV · WIDE COVERAGE

Full scope. Not the hyped 10%.

Most tools profile the headlines — the famous CVEs, the ten condition keys everyone benchmarks. We instrument the full surface: every action, every condition, every chained trust path. Hype is optional.

§05 — PRODUCT PORTFOLIO

What we publish.

→ all products
● PRIVATE BETA prag-01

whocan.

The authorization answer engine for Cloud providers. Evaluates the full decision chain and exposes it through RQL — a query language written for this problem. Designed for regulated operators across private banking, healthcare, and critical infrastructure.
→ whocan.cloud · docs · changelog visit whocan.cloud →
○ IN DEV · 2026 prag-02

[ tbd ]

A second product in the authorization family, in closed design-partner preview. Orthogonal surface, same discipline — read at the source, evaluate the real chain, expose as code.
→ confidential request preview →
§06 — ECOSYSTEM

Partners & sovereign cloud.

→ partner program
startup program
partner network
accelerator · FR
programme · FR

Bring us your hard problem.

// bespoke builds
Co-design, custom build, build & operate.
// product sales
Whocan pilots, preview program access.
// security disclosures
PGP key on request. 72h response SLA.
// HQ
5-7 rue Bellini
92800 Puteaux, France — visits by appointment.