At SpiderOak Security Is Everything

At SpiderOak, security is our key design principle. SpiderOak products leverage a unique combination of Zero-Trust encryption and private Blockchain, delivering solutions with a level of confidentiality, integrity, and availability unavailable until today.

About Us

Founded in 2006, SpiderOak is on a mission to protect the world’s data.

  • Over a decade of inventing leading-edge security and privacy technology
  • Unashamed to take chances and be creative where others don’t
  • Tens of thousands of customers that prove our worldview
  • We invented No Knowledge software

Our growing portfolio of Secure Communication & Collaboration products leverage Zero Trust Distributed Data Enclaves and a unique deployment of Blockchain/Distributed Ledger, ensuring the confidentiality, integrity, and availability of your most sensitive data in any environment

We Protect Confidentiality


SpiderOak solutions are based on a Zero-Trust architecture where, by default, nobody is trusted either inside or outside of the infrastructure – eliminating inside threats, permission creep, and unintentional exposure.

  • End-to-End encryption ensures that infrastructure never has the keys to encrypted data.
  • Leverages NSA CNSAS cryptography.
  • Ensures data cannot be intercepted in transit or stolen from our servers.
  • Cipher keys are held only by endpoints with a need to know – never by the server or administrators.
  • Distributed public key infrastructure authenticates devices and users without the need for passwords.
  • Extra layer of protection for lost or stolen devices being hacked for sensitive data.

We Ensure Integrity


Our use of blockchain provides complete attribution and non-repudiation of all data transactions. Every modification made to the ledger is time stamped and signed, digitally ensuring traceability and complete integrity.

  • Supports a powerful policy engine that enforces need to know, rejecting all access requests or actions from those without a defined need to know or authority.
  • Transforms the ledger’s global state with any data modification added to the blockchain.
  • Unlimited version control automatically retains every version of every file.
  • Supports non-repudiation, so users cannot deny authorship to a transaction that they originated.
  • Centralized team management controls file deletion, folder creation, and user privileges.
  • Removes human intervention from the authentication process, reducing errors and potential threats.
  • Provides instant notifications whenever anyone updates a shared file or folder.

We Enable Availability

Secure Collaboration

The combination of Zero-Trust No Knowledge Encryption and Distributed Ledger allows clients to operationalize previously unavailable datasets whose sensitivity made their use in virtual collaborative environments far too risky.

  • Easy to use secure collaboration for teams to file share, chat, and video call across desktop and mobile platforms.
  • Full Mobile Functionality: download, view, and upload files from your mobile device for complete continuity.
  • SaaS/Hosted or On-Premise deployment.
  • Decentralized Data Storage: no ‘hackable’ single point of failure.
  • Cryptographically compartmentalized collaboration spaces with strong IdAM assurances.

Our Design Philosophy

Constructional Security

SpiderOak is built secure from the ground up

From explicit entitlements in mobile applications to process-sandboxing in web browsers, security is a first-class citizen in all our products, rather than an after-the-fact addition.

Most commercial off-the-shelf communication and collaboration products have an inherent weakness – “Security was NOT considered a key design feature.”

Whether unintentional omission or willful blindness, this blind-spot can expose sensitive data and communications to everything from session hijacking, modification, and insider threats, to theft of intellectual property, trade secrets, and PII.

All SpiderOak’s products are built secure from the ground up. We employ an industry unique design philosophy we call Constructional Security, an approach where protecting data is put on par with communicating, creating, and managing.

Advisory Board

Admiral James A. “Sandy” Winnefeld, Jr.

A 1978 graduate of the Georgia Institute of Technology, Admiral Winnefeld holds a degree in Aerospace Engineering. He began his naval service as a fighter pilot, flying the F-14 Tomcat during several deployments to the Western Pacific and Arabian Gulf regions, and continued his career instructing at the Navy Fighter Weapons School (also known as TOPGUN) and serving as senior aide-de-camp to General Colin L. Powell. He commanded a fighter squadron, the amphibious ship USS CLEVELAND, and the aircraft carrier USS ENTERPRISE. As a flag officer, he commanded a carrier strike group, two NATO commands, the United States 6th Fleet, United States Northern Command, and the North American Aerospace Defense Command (NORAD). He retired in 2015. A prolific fiction and non-fiction strategy and military science writer, Sandy’s latest work can be found at

US Army Lieutenant General Ken Tovo

A 1983 graduate of the United States Military Academy, he commanded at every level in the 10th Special Forces Group (Abn) from detachment to group commander. He has also served as Deputy Commander, U.S. Southern Command; Commanding General, Combined Security Transition Command-Afghanistan and NATO Training Mission-Afghanistan; Commander, Special Operations Command Central; and Deputy Commander, Special Operations Command Europe. His operational assignments include the first Gulf War; refugee relief operations in Turkey and Northern Iraq; noncombatant evacuation operations in Sierra Leone; peacekeeping operations in Bosnia on two occasions; five tours in Iraq; and one tour in Afghanistan.

Professor Daniel Diermeier

Professor Daniel Diermeier is an internationally renowned political scientist and management scholar. Daniel was recently elected Vanderbilt University’s ninth chancellor, beginning his term on July 1st, 2020. A member of the American Academy of Arts and Sciences and a Guggenheim fellow, Diermeier also served as the provost at the University of Chicago, where he was recognized as the David Lee Shillinglaw Distinguished Service Professor and as dean of the Harris School of Public Policy.

Ms. Nancy Dillman

Ms. Nancy Dillman most recently served as an Operations Officer at the Central Intelligence Agency, specializing in denied-area tradecraft techniques, along with counterintelligence (CI) and counterterrorism (CT). Before joining SpiderOak, Ms. Dillman’s last overseas tour took place in Afghanistan, where she handled sensitive CI and CT accounts. Following her public service, Ms. Dillman set out to develop data-analytic products that would offer real-world solutions to USG clients. She became the majority owner and CEO of Rsignia Inc. in 2015, and after having successfully built the company, Ms. Dillman oversaw and led the acquisition of Rsignia by FedData Holdings in 2019.


Talk to an expert now.