Nexo lets groups of users easily converse, exchange files and work together in what we call Channels. We are fund-amentally different from leading sync services:  where they are cloud-based, we use a peer-to-peer architecture. Instead of copying your content to a public cloud, information exchanged with Nexo flows directly between user devices over a mesh network and avoids the cloud altogether.

This defines the
next generation of file sync and sharing, and brings along a slew of long-awaited improvements.  

Lowest Cost

No infrastructure. In the world of Internet company accounting, “cost of revenues” is typically a measure of the equipment, people and facilities required to host and operate cloud-based services. Box, Inc.’s most recently filed financials shows this cost to be around 30% of their revenues. This is attributable to the data centers required to deliver application functionality and to safeguard millions of user files.

With no cloud to support, Nexo’s corresponding costs are 1/200 of Box’s. Put another way, it costs about $2,000 to support 1,000 cloud sync users for one year – that same cost for Nexo is less than $10. This gives Nexo a significant cost advantage, and the savings are passed along to our customers.

Granular Access Rights

True “screen only” access. With our unique access control options, senders can prevent recipients from saving, copying, scraping, editing, printing or forwarding a file – its contents can only be viewed using our software. These files don’t even appear in the device’s file system. By contrast, the “read only” feature of consumer-grade cloud services is easily bypassed.

Auto-deletion. Nexo’s level of file access control enables other valuable features. For example, a sender can designate a file to be permanently deleted after a specific number of views, an interval after it’s first opened, or by a specific date.

Unique multi-factor authentication. Nexo will be offering a mobile feature called the Personal Key. Files sent with this option cannot be accessed without the recipient having their phone within Bluetooth range of the receiving desktop or laptop. This offers a high level of confidence that the Nexo user is the actual intended recipient. In addition, Nexo leverages other mobile features that can restrict access to specific geographic ranges and timeframes.

Single Solution

One size fits all.  The file sync and sharing (FSS) market is highly fragmented. Today, file size dictates the method used. Email tops out at 15 MB, cloud sync files have a practical limit of 5-10 GB, and larger files must be sent digitally using FTP or complex, expensive enterprise applications like IBM Aspera. Due to these high costs, larger files are often put on removable media and physically shipped. On the other hand, Nexo securely handles files of any size, does not require IT, and lets users send unlimited files for a fixed, low-cost monthly subscription.

Curtail “Shadow IT.” One of the most serious challenges facing businesses is the rise of Shadow IT. That is, the self-directed use by employees of myriad consumer-grade services to store sensitive corporate documents. This has put millions of confidential documents and trade secrets at risk because they are being hosted on services with inferior security standards and on equipment that is not within a company’s control. As a corporate standard, Nexo can handle almost any FSS use case and can restore control of, and accountability for, the proper use of sensitive information. 

No Size Limits

Unlimited file size.  Every file uploaded to a cloud-based service costs real money. It’s not just storage costs – with millions of users vying for access to the same cloud, large files create greater contention for the finite bandwidth available. This is why free cloud-sync services have to restrict file sizes. With Nexo, there are no centralized storage or bandwidth costs.

No volume fees. For the same reasons, cloud services have to cap the amount of storage provided both to free and to paying users. Currently, Dropbox provides 2 GB for its free users – a limitation that becomes increasingly impractical as files grow larger. Soon, users will either be forced to pay or Dropbox will have to fund additional storage for the 95% of its users that don’t pay them. With a base estimated at 800 million users, this is a real threat to its business model.


Ultra-efficient protocol. Data is exchanged between Nexo devices at close to line speed, and packets originating from the sender begin arriving at their destinations almost immediately. Based on head-to-head tests and published figures, Nexo is 3X faster than the “boxes” and about 2X faster than IBM Aspera.

Device-direct connections. With cloud-based services, files must first be uploaded and then downloaded, causing built-in delays. Nexo bypasses this step and eliminates these delays.

Mesh acceleration. Every node in a peer-to-peer mesh is both a sender and a receiver of packets. And each receives packets simultaneously from multiple other nodes, effectively increasing the mesh’s overall throughput for every additional recipient. In other words, the more recipients in a transfer, the faster they all get the payload.


Nexo peerGroup™ software.  This is an application that uses Nexo’s peerFlow networking to enable groups to securely collaborate around files. Users can create and invite members to “Channels” that provide a range of access to a set of shared files. Channel members can engage in group or private chat, both of which can be configured to auto-expire after a certain timeframe. Using peerFlow, Nexo will also support voice and video chat as well.

Advanced features. Files can be locked to prevent conflicting edits, and are automatically versioned. Plus, file owners can manually revoke access to them at any time. In addition, Channel owners and members can archive the files they can access to clean up the peerGroup interface.


Encryption. All information exchanged via Nexo’s patented peerFlow™ mesh network transport – whether on disk or in transit – is automatically encrypted using a proprietary combination of RSA, AES and SHA-256 standards. In addition, we make encryption a seamless experience, so that users don’t have to take extra steps or manually exchange keys.

Node-to-node authentication. When a mesh network is created between the sender and the receivers, our protocols can detect the presence of a “man in the middle” (MiM) attempting to insert itself into the dataflow. If an unrecognized node is detected, then no further packets are sent between those two nodes, and the data follows a different route.

Multi-pathing. When encrypted packets flow between nodes, they follow different dynamic paths, making it very difficult to access all the pieces of a transmission.

No intermediate storage. Cloud-based services conveniently aggregate millions of users at a single attack point, making them exceedingly attractive targets. With no cloud, Nexo presents no target larger than a single user.