Secure Channels provides innovative, effective security solutions designed to complement existing investments in security. Our products offer advanced access control, adaptable encryption, data protection, enterprise confidentiality solutions and proximity-based monitoring and intelligence capabilities. We help you meet your security challenges.
Our mission is to help organizations make the most of their active security tools used for authentication and data protection, while providing a COST and PERFORMANCE effective solution to efficiently address the ever-increasing security challenges organizations face today.
Secure Channels’ Agile Security Platform (ASP) approaches authentication and protecting data from an innovative platform that builds security into endpoints, applications, and networks from the inside out. Whether it’s securing access to your critical resources (with a 5-factor authentication approach that minimizes user effort) or protecting your data from breach, theft and misuse using our patented superencipherment solution, our Agile Security Platform allows organizations to take a modular approach to better suit their needs.
Finally, what sets the Secure Channels solutions apart from other security solutions is in the design to be an agnostic solution. Secure Channels recognizes for example, most organizations already use a key management system, so rather than introduce yet another key management system for access, SUBROSA seamlessly uses the organization’s existing key management system. Secure Channels’ solutions are designed to be customizable to your environment without compromising the level of protection it provides while avoiding additional maintenance and support efforts by support teams. Dedicated delivery modes support both existing systems, applications and new development for data protection and access control.
The Superencipherment Engine (SE) is a flexible, integrable software development kit providing advanced encryption capabilities wherever required in your application or enterprise. The SE implements SCI’s superencipherment protocol which significantly enhances the cryptographic strength of standard algorithms (minimum of 1,024 bits for symmetric block ciphers) while offering compliance with industry and government standards.
ParaDoxBox™ is a versatile encryption utility that secures data in files, on endpoints, on networks or in the Cloud, providing protection levels that meet or exceed industry and national standards. ParaDoxBox™ supports full disk encryption, partition encryption, volume/container encryption and file encryption. It is transparent once deployed, requiring no specialized training. Users select the encryption algorithms and the standards (including FIPS 140-2 Annex A). ParaDoxBox™ includes SCI’s Superencipherment Engine. Access to encryption keys is controlled using SCI’s SUBROSA® and Idiomatic Recognition™ authentication technologies with options to include other authentication factors including possession, human biometrics, machine inherence and location. Even if the network is breached, ParaDoxBox™ ensures that your data is safe.
SUBROSA™ is an advanced multifactor authentication engine that enables enterprises and consumers to overcome the challenges and vulnerabilities associated with password credentials while providing up to five factors of authentication. SUBROSA’s™ unique Idiomatic Recognition™ knowledge factor technology minimizes memorization challenges, defeats password cracking, shoulder surfing, social engineering and phishing attacks. In addition, SUBROSA™ can be user configured to support possession factor authentication with either soft or hard tokens, biometric authentication, machine inherence authentication and location-based authentication.
Mobile Device Control Solution (MDCS)
Modern mobile devices, such as smartphones and tablets, ubiquitous across enterprise provide dramatic increases in personnel availability and productivity. Unfortunately, the same capabilities which make the devices valuable also create the risk that confidential or sensitive conversations and information will be leaked when the devices are used to covertly record and transmit sensitive data. SCI’s MDCS leverages a combination of existing enterprise assets, a mobile application and the integration of SCI PROXiMITTER™ devices to offer a combination of automated mobile device controls that seamlessly disable and enable specified features (e.g., camera, WiFi, Bluetooth, microphone, etc.) based on device location. MDCS provides the necessary levels of assured confidentiality, improves productivity and reduces resources allocated to mobile device security.
SCI’s PROXiMITTER® takes the concept of a proximity beacon to entirely new levels. Unlike conventional proximity beacons, PROXiMITTER® devices are bidirectional, offering two-way connectivity over WiFi, Bluetooth, Near Field Communications (NFC) and 900Mhz radio. PROXiMITTER® comes in a variety of form factors ranging from badges to repeaters that can be powered by battery, over Ethernet or by USB power connections. The devices are programmable and configurable for an almost limitless number of use cases including asset management, traffic analysis, device control, marketing analytics, surveillance, loyalty program implementation, physical access control and many more. SCI offers engineering and design services to ensure seamless integration of PROXiMITTER® capabilities into your environment.
Integration and support services are available for all SCI products. Integration engineering services are designed to ensure that SCI solutions are tailored for your environment and support your operational needs. These services include creating customized versions of our standard products and integration with your existing tools. Our engineers will ensure that your use cases and needs are met. Annual support contracts are available as an option for all SCI products and are tiered based on the service levels required.