Secure Channels Inc
(855) 825-6766
SUBROSA®

Simple User Based Resource Oriented Segmentation Architecture - Introducing SUBROSA® users choose unique data resources to generate their keys and establish a personal interaction pattern with the resource. This relationship is intuitive and easily memorized, but not readily shared or stolen.

Scsubrosa1 300x300

SUBROSA® creates secure, zero-knowledge cryptographic keys

Subrosa logo
  • SUBROSA® users choose unique data resources to generate their keys and establish a personal interaction pattern with the resource. This relationship is intuitive and easily memorized, but not readily shared or stolen. Threats Posed by Brute Force Attacks Are All but Eliminated Without the original, unchanged data resource and knowledge of the personal interaction pattern, replication of a user’s key(s) isn’t feasible. SUBROSA® Capabilities - Eliminate the vulnerabilities associated with password based authentication - Extend authentication assurance with Five Factor Authentication™ * Knowledge * Possession * Human Inherence (Biometric) * Machine Inherence * Location

SUBROSA® Mobile

  • Change the way employees authenticate to mobile applications.
Byodfinal mobile

SUBROSA® SDK

Enterprisefinal sdk
  • SUBROSA® easily integrates with operating systems, applications and devices, providing stronger authentication anywhere a password is required.

SUBROSA® Desktop

  • Authentication for Active Directory, SSO or LDAP.
Posfinal desktop

Coming Soon......SUBROSA® Cloud

Hsmcloudfinal
  • SUBROSA® technology to secure the Cloud.