EN – Technology2018-09-18T10:18:05+00:00

Security and privacy by design

Because the security of your data must be intrinsic

When it comes to the security and privacy of your data, we believe protection must be intrinsic; inherently present in every component and built for that purpose. Storro’s components are designed to be non-critical and highly resilient, with security that exceeds encryption only.

We do this through encryption, compartmentalization and decentralization amongst other techniques. It goes without saying that the encryption used is of the highest standards.

This way you can rest assured your data only comes into the hands of those for whom it is intended.

When it comes to the security and privacy of your data, we believe protection must be intrinsic; Inherently present in each component, and built for that purpose. Storro’s components are designed to be non-critical and highly resilient, with security that exceeds encryption.

We do this through encryption, compartmentalization, decentralization and other techniques. The encryption is of the highest standards of course.

So you can rest assured your data only comes into the hands of those for whom it is intended.

Under the hood

Blockchain

Every Storro project has its own blockchain with the version parent hash(es) enclosed in the signatures of each version, creating a crypto chain. The result is that every change in any project is visible to its members and the trail cannot be manipulated.

More info

Cryptography

Storro uses the highest standards of encryption protocols and strives for the easiest implementation. Our encryption is threefold: securing connections between devices; enciphering files on your harddrive; and cryptographically enforcing rights management. All keys are generated locally, and solely in possession of the data owner(s).

More info

Compartmentalization

Files are automatically cut up into small pieces and stored spread out over a network of project members. Of course this is done redundantly to ensure that all data pieces remain available, even when a data carrier is unavailable.

More info

Decentralization

Storro uses the power of peer-to-peer technology for communication between project members. This means there is no central database and no central point of failure. Storro’s storage capacity as well as the key management is fully distributed.

More info

Under the hood

Blockchain

Every Storro project has its own blockchain with the version parent hash(es) enclosed in the signatures of each version, creating a crypto chain. The result is that every change in any project is visible to its members and the trail cannot be manipulated.

More info

Cryptography

Storro uses the highest standards of encryption protocols and strives for the easiest implementation. Our encryption is threefold: securing connections between devices; enciphering files on your harddrive; and cryptographically enforcing rights management. All keys are generated locally, and solely in possession of the data owner(s).

More info

Compartmentalization

Files are automatically cut up into small pieces and stored spread out over a network of project members. Of course this is done redundantly, to ensure that all data pieces remain available, even when a data carrier is unavailable.

More info

Decentralization

Storro uses the power of peer-to-peer technology for communication between project members. This means there is no central database and no central point of failure. Storro’s storage capacity as well as the key management is fully distributed.

More info

Security by design makes Storro unique

Storro’s components are designed to be highly resilient with a security that exceeds encryption alone.

Why is Storro the most secure file sharing solution?

RESILIENCE

Thanks to Storro’s robust peer-to-peer technology you can continue to collaborate locally with your peers, even when your servers are down or your entire internet connection is interrupted.

MOUNTED DRIVE

Storro mounts a virtual encrypted drive on your system in which you can open, adapt and save files; protected at all times.

FAULT TOLERANCE

As Storro doesn’t limit the number of sytems/locations on which data is duplicated (redundantly), hardware failure doesn’t lead to loss of data.

DE-DUPLICATION

By only communicating the data chuncks influenced by changes in a file, Storro has low overhead and costs less space on disc.

REDUNDANCY

Every single data chunk in a project has copies stored at project members, so that the loss of a single data carrier does not affect continuity.

VERSION CONTROL

Thanks to a private blockchain per project and the standard Revision Control feature, one can return to every previous state in time of every file or entire project.

We use Storro as a simple and safe alternative to e-mail when exchanging files with external parties. We chose Storro because of the pleasant user interface, easy scalability, limited dependency on an infrastructure and cost-saving on part of our IT solutions.
Marcel Boekhorst, CEO Signum Interfocus
For projects at clients, I use both my own Office365 cloud and Storro. With Storro I have more control over the storage location of sensitive documents. I know exactly where these documents are stored securely, namely at workplaces that I myself authorize. And I no longer need to use unsecured email. Storro arranges this for you. Great!
Rien Bosma, Bosma Consulting
We use Storro for our projects with external partners, and it exceeds all expectations. The members of the various projects can work together seamlessly on the various files that are needed for our projects, we keep control over the versions and can see exactly which changes have been made.
Gerben Klein Baltink, CEO Trefecta Mobility
Because we do not want to give away our business plan and research data, we were looking for software that keeps our data safe. Almost all ‘free’ cloud providers have their terms and conditions that they may use your data; something we do not want. After a long search we found Storro, and it feels good to have a supplier that offers good support.
Michel Modderkolk, CEO UPWEGO
Download Storro