Clocr Powered by Shard Security
We digitally shred the files, encrypt the fragments and spread them across different cloud storage locations. Even if someone hacks into a single storage location, they will not be able to view the file.
Proprietary and Powerful
Clocr is hosted on a world renowned cloud provider that has built in security practices. We use 256-bit AES encryption for all the files you store in Clocr by default. Clocr offers an Ultra-Security feature that is unique and proprietary to Clocr, providing additional layers of protection that are not offered by any other vendor in the industry. Easily keep track of all the files important files shared with you.
Clocr offers an Ultra-Security feature that is built on IPFS and Blockchain concepts, provides additional layers of protection that are unique and proprietary.
Strict Access Controls
Clocr locks down access at every layer. No one other than you can access your data
In addition to strong password security measures, multi-factor authentication offers additional layers of security.
Application Security | Pen Tests
We engage renowned, trusted third-party security firms to perform vulnerability testing, audits and penetration testing of Clocr application and infrastructure
Security From Ground Up
We built Clocr to be totally secure from ground up. Security is in the very fabric of Clocr’s architecture and culture. Refer to Amazon AWS security guide for more details
Clocr is 100% cloud native and hosted on Amazon Web Services(AWS). We leverage many AWS components to provide a reliable, fault-tolerant, and highly available systems in the cloud
Clocr takes extreme measures in safeguarding your data and continually researches and employs new ways to protect your data
We use the highest standard in network communications that provides bank level security. Data is transmitted using TLS 1.2 with AES 256 encryption, preventing any man-in-the-middle attack or data snooping. No data is stored on our local devices. Data is never transmitted in plain text. We not only encrypt data in transit we encrypt the files, data at rest as well.