Skip to content
Screenshot 2025-09-17 at 09.45.57
DekkoCORE
File Sharing & Collaboration
Screenshot 2025-09-17 at 16.17.08
DekkoDEMS
Digital Evidence Management
Two products. One secure platform.
DekkoCORE and DekkoDEMS both feature:

  Web-based app with no installs

  End-to-end encrypted security

  No file size or type restrictions

  Easy account creation process

  Comprehensive sharing controls

Law Enforcement
Securely collect and share digital evidence across agencies with full chain-of-custody.
law-enforcement
Defence Supply Chain
Protect classified designs and supplier data in a sovereign, fully encrypted workspace.
defence
National Security
Enable secure inter-agency intelligence collaboration with controlled encrypted access.
national-sec
Judiciary Departments
Exchange case files and evidence securely with clients and prosecutors without risk.
legal
Professional Services
Collaborate on client documents and financial data securely on a trusted platform.
prof-services
Healthcare
Share medical records and research securely across clinics and partners with compliance.
health
aron-visuals-bZZp1PmHI0E-unsplash

Permanently replace

Share files of any size, co‑edit in real‑time, request approvals & eSign, and video conference, all with end‑to‑end encryption and immutable audit.

Trusted Partners

 

Security without the friction

 

Zero-knowledge encryption
Your data remains mathematically inaccessible to everyone except you and the people you choose to share it with — not the cloud, not the provider, not administrators.
No file size or type limits
Handle massive videos, forensic artefacts, CAD files, datasets, and anything else without hitting arbitrary caps.
Guaranteed data sovereignty
Your data stays anchored within the geographic region you choose, under the legal and regulatory boundaries you control.
Effortless deployment without user limit
Roll out platform-wide access without licensing sprawl. One organisation, unlimited users, zero friction.
Full auditability
Complete, verifiable chain-of-custody for every file, signature, message, and action.
Built for compliance
Designed to meet strict regulatory, privacy, and operational requirements across high-assurance industries.

See DekkoCORE in action

 

Discover the top features of DekkoCORE

 

Granular Sharing Without the Risk
Choose who can view, download, upload, or co-edit—right down to each individual file. Every action is fully encrypted and logged, so sensitive information stays controlled even as it moves.
Product123123
Public sub
Collect Files Without Exposing Your Systems
Give communities, witnesses, clients, or partners a safe way to submit files directly into your environment—no accounts, no inbox overload, no security gaps. Each upload is end-to-end encrypted, time-stamped, and logged automatically, preserving integrity from the moment it’s received.
Sign Sensitive Documents
esigs

Authorise warrants, contracts and inter-agency agreements inside a fully protected workspace where every signature stays end-to-end encrypted, every step is time-stamped and logged, and nothing ever leaves the secure environment. Completed documents can be independently verified through the external validation tool, giving agencies proof of authenticity wherever the file travels.

Co-Edit in Real Time
coedit

Teams from different agencies refine drafts, update briefs and collaborate on high-sensitivity material without the document ever leaving its encrypted state. Confidential compute ensures processing happens in a secure enclave, so content stays protected even while multiple people are editing. Every change is captured, every action is logged, and the document remains confidential from the first keystroke to final approval.

Hold Sensitive Conversations Through Encrypted Messaging and Video Conferencing
Agencies discuss, plan and make decisions inside the same protected environment where their documents live. One-to-one or group messages stay end-to-end encrypted, and video calls run in a secure, access-controlled space that never exposes metadata or content to third parties. No external apps, no data leakage, no shadow channels — just confidential communication woven directly into the collaboration workflow.
messaging
videoconf
Show more

DekkoCORE Compliance

DekkoCORE is built for the security and collaboration needs of agencies and organisations working with sensitive information, providing a secure and jurisdictionally controlled environment that keeps documents consistent, accessible, and trusted across every stakeholder.

Data Sovereignty

DekkoCORE is cloud-based, with data sovereignty options for Australia, Canada, the United States and Switzerland.

 

Group 20

Compliance Status

DekkoCORE is:

IRAP assessed (PROTECTED)

DSPF Compliant (DISP)

GO-ITS/ITSG-33 aligned

CJIS Security Policy mapped

GDPR aligned

Immutable Audit

DekkoCORE records every action in a tamper-proof audit trail, providing clear accountability, chain-of-custody assurance, and full transparency across all sharing and collaboration.

Single Source of Truth

DekkoCORE centralises every piece of data in one secure system, reducing duplication, preventing data loss, and ensuring all teams work from the same authoritative record.

Integration Support

Single Sign-On
Integrates with Entra ID for controlled internal authentication
Malware Scanning
Integrates with Defender for automated malicious content analysis
SIEM
Integrates with Log Analytics Workspace for audit in Sentinel and Splunk
API Automation
Supports APIs to replace manual file transfer practices and systems

What DekkoCORE users are saying

LECCLaw Enforcement Conduct Commission (AU NSW)

“Dekko has a very strong encryption focus, a user-friendly gateway, and we can send large files securely without breaching IT security rules. It replaced a very manual and time-consuming process using FTP encryption and keys.”

Zurich City Police (Stadtzpolizei)


“Dekko has a very strong encryption focus, a user-friendly gateway, and we can send large files securely without breaching IT security rules. It replaced a very manual and time-consuming process using FTP encryption and keys.”

Ready to reach out?

If you’d like to learn more about DekkoCORE or discuss your requirements, our team is ready to assist.