
Device-to-device encryption,
person-to-person encryption
Data that decrypts after being unlocked using a user specific passkey, exceeding the widely used end-to-end encryption and guaranteeing a higher level of security

Multi-factor authentication
extending the current use of two-factor authentication, our wide range of security safeguards include biometric, voice recognition, and video verification

User key data at rest encryption
coming soon

Complete audit trail
extensive admin controls to view data activity and logs in real-time

IP address logging restriction
regulate access to specific IP addresses and domains by allowing or deny accces

CDN private network
allow users to effortlessly file share without locational concerns

Data stored over cloud, take full control over your data
access organizational data at any time from any device through your cloud vault, keeping data secure from hardware breaches

Security hardening
machine learning, brute-force detection, suspicious login, CSP, and SCC for both aggressive protection for data and user access

Whisper and Signal protocol
improving on existing software to enhance communication and maintain security

TLS 1.3
symmetric cryptography for encrypted data during transmission

Data retention
Share files and images with set passwords, expiration dates, restrict downloads, and enforce passkeys for file access

AES256 encryption
advanced encryption standards with an encryption block size of 256 bit

About us
Dooth Vault is a full cloud-based secured internal and external collaboration suite that can cater to an entire organization’s communication, data, and security needs.
Important Links
About Dooth
Contact Us
Corporate Office:
Dooth Inc.,
3206 Cove Bend Dr Suite B,
Tampa FL 33613
USA
Email: info [at] dooth.com
Phone: +1 813 578 7979