Have a question?
Support is just one click away. Browse answers to Frequently Asked Questions below or Contact Us.
General FAQs
Why is DekkoPro far more secure than other file sharing and collaboration products?
Why is DekkoGov the "gold standard" in encrypted security?
Security FAQs
How are my communications secured?
-
There are no ‘back doors’ or master encryption keys; these only introduce vulnerabilities.
-
A minimum of 3 layers of encryption (ECC AES-256 for file, message and conference media encryption, SHA384 for signing, SSL-4096 for client communication) are used at all times, on all secured objects.
-
Every document has its own key. One compromised document does not compromise a whole account’s data.
-
Similarly, one compromised account does not compromise the whole system.
What infrastructure do you store user data on and where?
DekkoGov utilises the Microsoft Azure Sydney (AU) region with triple data centre HA redundancy. DekkoPro uses the same region in a single instance configuration. All Dekko Meetings conference traffic is routed using Oracle Cloud Sydney region.
Is Dekko safe? Has it been compliance tested or independently verified?
Dekko has been IRAP PROTECTED assessed, is penetration tested by Deloitte and claims tested by Enex TestLab. Check out our compliance page to learn more and request our reports!
Do you support 2FA?
What is left on my device after logging out?
Locally, Dekko only stores what you are working on or what is cached during your session unencrypted. After you log out, your private key no longer exists and any data left on your device is useless. The tenancy tool can also be used set session expiry times.
What about my communication are secured?
-
File names
-
File contents
-
Message subject
-
Message contents
-
Message size
-
Video conference topic and notes
-
Video conference media
How are accounts secured?
How do you authenticate users at sign up?
How do you delete data?
When data and accounts are deleted, two things happen. First, the keys for all data subject to deletion are deleted. Following that, this encrypted data is overwritten with garbage data which is then deleted again.