Demand Dekko SECURE

The Platform Built with Security First


General FAQ

What is Dekko?

Dekko is a secure, cloud-based communication platform providing file storage with powerful sharing capability, document approval, messaging and video conferencing. Running on a combination Microsoft Azure and Oracle Cloud, it is appropriate for both consumers and B2B/B2C. It is free from spam and phishing, prevents leaks and misaddressing, has fully verified send and receive, an audit trail and user and group based security policies. Dekko runs in a web browser and uses TOTP for 2FA and is AAD integration ready.


How is my communication and data secured?

Dekko uses end-to-end encryption to secure all data uploaded and shared, messaged or sent and received in a video conference. Unlike other common communication platforms, we do not hold the keys to your data. Data passing through the network cannot be decrypted using information on the servers; the encryption and decryption process can only occur on the end-user’s device, and this is why no one else – including advertisers, hackers, or even Dekko’s creators or Microsoft Azure/Oracle administrators – can see your data. It is impossible to hijack a Dekko account and pretend to be someone that you are not without knowing the user’s password, and even then you can be protected by optional two-factor authentication.

How is Dekko different to other communication platforms?


Dekko is designed as a business-oriented solution, that provides secure file sharing, secure document approval, secure mail/chat and secure video conferencing as a single, web-based platform. End-to-end encryption means even Dekko can never read your data, and we don’t want to. Dekko relies on engineering solutions to provide privacy – not anonymity or secrecy. Dekko combines the security of popular privacy tools and the functionality of commonly used sharing tools in a package that is easy to implement, use and manage, providing a solution that is suitable for highly sensitive communication, content sharing and document approval.

Security is also managed completely transparently to users and administrators.

Dekko automatically handles all key management during registration and sharing and user are never required to opt in to security, nor are they able to opt out. Sharing securely on Dekko is very straightforward – users simply log in and send a message or file and no steps are required to secure any content.


Icons by Freepik