We go beyond encryption!

Clocr, your personal digital vault, is built on a unique, proprietary and patent-pending security platform that uses Interplanetary file system (IPFS) and blockchain concepts that provides additional layers of protection.
We go beyond encryption

Proprietary and Powerful

Patent-pending Security

Our patent pending security protocol digitally SLICES the files, critical information, passwords in to smaller fragments and then DISTRIBUTEs the fragments across multiple, decentralized storage locations.

Beyond Bank-level Security

The fragments are assembled only when the users access them. Clocr is hosted on AWS and uses 256-bit AES encryption and multi-factor authentication.

Ultra Security

Clocr offers an Ultra-Security feature that is built on IPFS and Blockchain concepts, provides additional layers of protection that are unique and proprietary.

Strict Access Controls

Clocr locks down access at every layer. No one other than you can access your data

Multi-factor Authentication

In addition to strong password security measures, multi-factor authentication offers additional layers of security.

Application Security | Pen Tests

We engage renowned, trusted third-party security firms to perform vulnerability testing, audits and penetration testing of Clocr application and infrastructure

Security From Ground Up

We built Clocr to be totally secure from ground up. Security is in the very fabric of Clocr’s architecture and culture. Refer to Amazon AWS security guide for more details

Always-on

Clocr is 100% cloud native and hosted on Amazon Web Services(AWS). We leverage many AWS components to provide a reliable, fault-tolerant, and highly available systems in the cloud

On-going Research

Clocr takes extreme measures in safeguarding your data and continually researches and employs new ways to protect your data

Encryption

We use the highest standard in network communications that provides bank level security. Data is transmitted using TLS 1.2 with AES 256 encryption, preventing any man-in-the-middle attack or data snooping. No data is stored on our local devices. Data is never transmitted in plain text. We not only encrypt data in transit we encrypt the files, data at rest as well.