About Checktxt: Pioneering Human-Centric SMS Security
Delivering privacy-first, intelligent SMS fraud protection—so organizations can empower people to communicate, connect, and live confidently in a digital world.
Our Story
Checktxt began with a realization — one that felt both obvious and overlooked.
Every year, companies spend millions protecting their networks, their data, and their reputations. They buy tools to stop ransomware, block phishing, and keep hackers out. But somewhere along the way, they forgot about the people behind those firewalls — their employees and their customers.
Inside the company walls, emails are scanned, filtered, and secured. But outside?
Personal inboxes and text messages — where people live, work, and communicate every day — have become the new front line of fraud. Messages pretending to be from trusted names, urgent donation requests, or fake delivery notices — these aren’t just scams; they’re attacks on trust.
It wasn’t that companies didn’t care. Protecting those channels was just too hard — too expensive, too complicated, too full of privacy risks. So most did nothing.
Checktxt was built to change that.
We designed a way to protect people without invading their privacy. No accounts. No complicated integrations. Just instant, intelligent fraud detection that keeps everyone safer — from the inside out.
And because our solution is easy to brand and share, it lets companies send a powerful message to the world:
We don’t just protect our systems. We protect our people.
Our Mission
To protect people, not just systems. Checktxt empowers organizations to keep their employees and customers safe from SMS fraud with a simple, privacy-first solution that works instantly — no apps, no complexity, no compromise.
Our Vision
A world where people can trust their text messages again, where digital communication enhances human connection rather than creating anxiety about potential threats.
Core Values
- Human-Centric Security - Technology should serve humans, not the other way around. Every feature we build prioritizes user empowerment over technical showcasing.
- Privacy by Design - We analyze threats, not people. Our commitment to privacy isn't a policy – it's our fundamental architecture principle.
- Accessible Innovation - Sophisticated technology should be available to everyone, regardless of technical expertise or economic circumstances.
- Empowerment Over Fear - Security awareness should inspire confidence and informed decision-making, never paralysis or anxiety.
- Continuous Learning - Both our AI systems and our human team evolve daily, staying ahead of emerging threats while maintaining our accessibility commitment.
Checktxt Reviews: What Our Users Say
Individual User Testimonials
Leadership: Experienced Cybersecurity Innovators
Jack Marshall, Co-founder & CEO
Serial Entrepreneur | Security Innovator | Customer Success Champion
Jack brings over 20 years of cybersecurity leadership experience to Checktxt, having held key positions at industry-leading security companies including Fortify (HP), AlienVault (AT&T), Prevoty (Imperva), and Contrast Security.
Background:
- Founded Photoloft.com in 1998, pioneering photo sharing before social media existed
- Successfully took company public before Canon acquisition
- Former CEO of Bolster with funding from M12 (Microsoft) and Cross Link Capital
- Customer Success expertise embedded throughout Checktxt‘s DNA
Philosophy:
At Checktxt, we believe protection should extend beyond networks — it should protect people.
Corporations and government agencies face massive cyberattacks every day, and they rightfully invest millions to defend their systems. But when everyday individuals are targeted, the cost is far deeper than dollars. Fraud and identity theft leave lasting emotional scars — shaking confidence, trust, and even a sense of safety.
We founded Checktxt on a simple principle: everyone deserves protection. Our mission is to make it easy and affordable for organizations to extend their security beyond their walls — to the employees, customers, and citizens who rely on them.
Because true security isn’t just about data — it’s about people.
Personal:
Based in Los Gatos, CA, Jack has been married for 39 years and raised three children. His personal experience with family members receiving SMS scams inspired Checktxt’s focus on protecting families, not just employees.
Message from Co-founder/CEO Jack Marshall
When I first ventured into cybersecurity back in 2003, a well-respected CISO shared a piece of wisdom that has stuck with me:
“Security is easy if you have the right attitude.
Imagine a glass of water filled halfway. Some will say it’s half empty; others will say it’s half full. In cybersecurity, however, “THE GLASS IS TRYING TO KILL YOU.”
It was a funny thought back then. Organizations were battling self-replicating malware like Code Red, or the Anna Kournikova virus that flooded email servers with endless messages. The stakes felt different.
But then things changed. Cybercrime escalated. What started as disruptive mischief turned into serious financial theft. In 2024, some analyst estimate cybercrime caused $9.1 trillion USD in global damages. If cybercrime were a country, it would rank as the world’s third-largest economy, trailing only the U.S. and China.
People aren’t laughing anymore. If you know someone who’s been a victim, you understand that the impact goes far beyond financial loss. The stress, anxiety, and sheer time drain can be overwhelming. I’ve met people whose lives were turned upside down — often at the worst possible moments, like just before a vacation or while planning a wedding. Their stories are heartbreaking.
This service is designed to help prevent such experiences. It exists as a free service for everyone — whether you’re non-technical, older, or simply a good person trying to stay safe online. Our goal is to provide simple, effective protection to keep you and your loved ones from becoming victims.
Stay safe,
Jack Marshall
Our Advisory Board
Cybersecurity Industry Veterans:
- Former CISOs from Fortune 500 companies
- Academic researchers in mobile security
- FTC consumer protection specialists
- Election security and integrity experts
Technical Innovation Council:
- AI/ML researchers from leading universities
- Mobile carrier security specialists
- Threat intelligence professionals
- Privacy and civil liberties advocates
Areas of Expertise: Deep Specialized Knowledge
SMS Threat Intelligence
Political Donation Fraud Specialists
- Only security company with specialized political scam database
- Nonpartisan approach protecting all political affiliations
- Election cycle expertise with surge capacity planning
- Coordination and integrations with FEC, Open Secrets and ProPublica
AI-Powered Threat Detection
- Patent-pending CHAI engine (USPTO 63778,679)
- Compound AI architecture analyzing multiple threat vectors
- Behavioral pattern recognition identifying emerging attack methods
- Continuous learning from global threat intelligence
Mobile Security Architecture
- Zero-friction deployment without app installation requirements
- Cross-platform compatibility across all devices and carriers
- Privacy-first design with minimal data collection
- Enterprise-grade scalability supporting millions of users
- Can be used with SMS, WhatsApp, Signal, Discord, or email.
Industry Vertical Expertise
Financial Services Security
- Strengthen compliance by proactively protecting customers
- Prevent wire transfer and payment redirection fraud
- Reduce account takeover risk
- Gain visibility into attacks targeting your customers
Healthcare and HIPAA Compliance
- Enhance security posture and support HIPAA compliance
- Gain visibility into attacks targeting patients or your organization
- Strengthen telehealth communication security
- Increase patient confidence and trust
Government and Election Security
- FISMA compliance for federal agencies
- FedRAMP cloud security requirements
- Election integrity and voter protection
- Emergency communication security
Managed Security Service Providers
- Multi-tenant architecture design
- White-label partnership programs
- Revenue optimization strategies
- Client retention and expansion
Professional Organizations – Law firms, Private bankers, CPAs…
- Protect against data leakage and financial fraud
- Build trust with clients by offering a unique security service
- Safeguard confidential communications from impersonation and phishing
- Reduce the risk of unauthorized instructions, wire requests, or sensitive data disclosures
- Enhance compliance posture across client-sensitive industries (FINRA, SEC, ABA, etc.)
Real Estate Brokerages and Title Companies
- Prevent closing-stage fraud, including wire-transfer redirection and impersonation attacks
- Build trust with clients by offering a unique security service
- Verify the legitimacy of time-sensitive messages, reducing confusion and delays
- Protect clients from scammers posing as agents, lenders, or title officers
- Enhance your firm’s reputation for safety and professionalism throughout the transaction
Data Security & Privacy: Your Trust, Our Foundation
Privacy-First Architecture
What We DON’T Collect (and we definitely DO NOT sell your data):
- No personal information beyond submitted message content
- No contact lists or address book access
- No location data or device tracking
- No behavioral profiling or usage analytics
- No account creation or password storage
What We DO Analyze:
- Message content for threat indicators only
- Sender information for pattern recognition
- Embedded links for malicious destination detection
- Metadata patterns for attack vector identification
Data Lifecycle Management:
- Immediate deletion after analysis completion
- We store all messages for training
- Encrypted transmission for all communications
- Secure disposal of all temporary data