Have a question?

Support is just one click away. Browse answers to Frequently Asked Questions below or Contact Us.

General FAQs

Why is DekkoPro far more secure than other file sharing and collaboration products?

Every file, document. message or video conference on the DekkoPro platform is completely protected by using a unique key combination and unbreakable encryption (E2EE). The unique technology, built into the Dekko platform, ensures that the keys are managed invisibly at all times. This guarantees that, once a user is verified and registered, they are the only ones who have access to the shared data.
DekkoPro guarantees Zero Trust, meaning all users are authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
DekkoPro is easy to use and deploy without any security training and does not require complex IT administration.
Other file sharing platforms do not have this built in, sophisticated technology meaning that access to your data is not restricted to the recipient. In fact, most users of these popular platforms, are unaware that the platform provider has access to your data at all times. Your account is password protected, but your valuable data is not protected!  In the case of a breach or a bug your data is highly vulnerable.

Why is DekkoGov the "gold standard" in encrypted security?

DekkoGov takes data protection to the highest level. Every single file, document, message and video conference on DekkoGov is protected using E2EE and a unique key management protocol. This level of encryption is used in the highly-secret communication channels by the military and guarantees Dekko is a zero-knowledge platform. This means that no one, including Dekko, can ever access your data at any time!
DekkoGov now brings this gold security standard to government and enterprise users for protecting sensitive data at rest, in transit and at work.
Additionally, DekkoPro is easy to use and deploy without any security training and does not require complex IT administration.

Security FAQs

How are my communications secured?

Every message, document and video conference on Dekko is secured with multiple layers of encryption and can only be read by the sender and the receiver no one else. No information on the server or in transit can be used to decrypt and read the data. Even the creators of Dekko and administrators of a system using Dekko Secure cannot see user's data, since the user’s password is itself encrypted.
  • There are no ‘back doors’ or master encryption keys; these only introduce vulnerabilities.
  • A minimum of 3 layers of encryption (ECC AES-256 for file, message and conference media encryption, SHA384 for signing, SSL-4096 for client communication) are used at all times, on all secured objects.
  • Every document has its own key. One compromised document does not compromise a whole account’s data.
  • Similarly, one compromised account does not compromise the whole system.

What infrastructure do you store user data on and where?

DekkoGov utilises the Microsoft Azure Sydney (AU) region with triple data centre HA redundancy.

DekkoPro uses the same region in a single instance configuration. All Dekko Meetings conference traffic is routed using Oracle Cloud Sydney region.

All cloud infrastructure utilised by Dekko is IRAP-PROTECTED assessed.

Is Dekko safe? Has it been compliance tested or independently verified?

Dekko has been IRAP PROTECTED assessed, is penetration tested by Deloitte and claims tested by Enex TestLab. Check out our compliance page to learn more and request our reports!

Do you support 2FA?

Yes! For regular Dekko accounts, 2FA is performed using the TOTP standard, meaning apps like Microsoft Authenticator, Google Authenticator or open source alternatives can be used. Azure Active Directory SSO accounts can also utilise MFA during the log in procedure based on the parent organisation’s security policies. AAD can also specifically target Dekko for MFA, as well as other Conditional Access controls.

What is left on my device after logging out?

Locally, Dekko only stores what you are working on or what is cached during your session unencrypted. After you log out, your private key no longer exists and any data left on your device is useless. The tenancy tool can also be used set session expiry times.

What about my communication are secured?

Without any action required other than pressing ‘send’, Dekko secures the following using end-to-end encryption:
  • File names
  • File contents
  • Message subject
  • Message contents
  • Message size
  • Video conference topic and notes
  • Video conference media
Dekko does not utilise end-to-end encryption for metadata, as it is developed primarily as a business solution privacy tool - not an anonymity tool.

All site communications are secured using TLS 1.3 and HSTS.

How are accounts secured?

Accounts are secured by your password, which Dekko does not (and can not) know. Your public and private keys are generated during registration, and your private key is encrypted using your password before it is sent to our servers. Passwords are hashed and salted before they are sent to our servers, and for SSO accounts a hybrid encrypted private key storage mechanism is employed.

How do you authenticate users at sign up?

By default, all accounts must perform an email verification before they are able to log in for the first time. The tenancy tool can be used to enforce all invitees in tenancy DekkoHubs to also perform an SMS verification.

How do you delete data?

When data and accounts are deleted, two things happen. First, the keys for all data subject to deletion are deleted. Following that, this encrypted data is overwritten with garbage data which is then deleted again.

Couldn't find what you were looking for?