At SpiderOak Security Is Everything

At SpiderOak, security is our key design principle. SpiderOak products leverage a unique combination of Zero-Trust encryption and private Blockchain, delivering solutions with a level of confidentiality, integrity, and availability unavailable until today.

About Us

Founded in 2006, SpiderOak is on a mission to protect the world’s data.

  • Over a decade of inventing leading-edge security and privacy technology
  • Unashamed to take chances and be creative where others don’t
  • Tens of thousands of customers that prove our worldview
  • We invented No Knowledge software

Our growing portfolio of Secure Communication & Collaboration products leverage Zero Trust Distributed Data Enclaves and a unique deployment of Blockchain/Distributed Ledger, ensuring the confidentiality, integrity, and availability of your most sensitive data in any environment

We Protect Confidentiality


SpiderOak solutions are based on a Zero-Trust architecture where, by default, nobody is trusted either inside or outside of the infrastructure – eliminating inside threats, permission creep, and unintentional exposure.

  • End-to-End encryption ensures that infrastructure never has the keys to encrypted data.
  • Leverages NSA CNSAS cryptography.
  • Ensures data cannot be intercepted in transit or stolen from our servers.
  • Cipher keys are held only by endpoints with a need to know – never by the server or administrators.
  • Distributed public key infrastructure authenticates devices and users without the need for passwords.
  • Extra layer of protection for lost or stolen devices being hacked for sensitive data.

We Ensure Integrity


Our use of blockchain provides complete attribution and non-repudiation of all data transactions. Every modification made to the ledger is time stamped and signed, digitally ensuring traceability and complete integrity.

  • Supports a powerful policy engine that enforces need to know, rejecting all access requests or actions from those without a defined need to know or authority.
  • Transforms the ledger’s global state with any data modification added to the blockchain.
  • Unlimited version control automatically retains every version of every file.
  • Supports non-repudiation, so users cannot deny authorship to a transaction that they originated.
  • Centralized team management controls file deletion, folder creation, and user privileges.
  • Removes human intervention from the authentication process, reducing errors and potential threats.
  • Provides instant notifications whenever anyone updates a shared file or folder.

We Enable Availability

Secure Collaboration

The combination of Zero-Trust No Knowledge Encryption and Distributed Ledger allows clients to operationalize previously unavailable datasets whose sensitivity made their use in virtual collaborative environments far too risky.

  • Easy to use secure collaboration for teams to file share, chat, and video call across desktop and mobile platforms.
  • Full Mobile Functionality: download, view, and upload files from your mobile device for complete continuity.
  • SaaS/Hosted or On-Premise deployment.
  • Decentralized Data Storage: no ‘hackable’ single point of failure.
  • Cryptographically compartmentalized collaboration spaces with strong IdAM assurances.

Our Design Philosophy

Constructional Security

SpiderOak is built secure from the ground up

From explicit entitlements in mobile applications to process-sandboxing in web browsers, security is a first-class citizen in all our products, rather than an after-the-fact addition.

Most commercial off-the-shelf communication and collaboration products have an inherent weakness – “Security was NOT considered a key design feature.”

Whether unintentional omission or willful blindness, this blind-spot can expose sensitive data and communications to everything from session hijacking, modification, and insider threats, to theft of intellectual property, trade secrets, and PII.

All SpiderOak’s products are built secure from the ground up. We employ an industry unique design philosophy we call Constructional Security, an approach where protecting data is put on par with communicating, creating, and managing.


Talk to an expert now.