Secure Channels Inc
(855) 825-6766
Technology Overview

Secure Channels Technology

The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm. It is also known as cascade encryption, cascade ciphering, and multiple encryption. Superencipherment refers to the outer-level encryption of a multiple encryption. The process and modernized techniques for doing so has been patented due to its technological advancement.

This patented protocol is known as PKMS2 [Patern-Key-Multi-Segment-Multi-St...

Superencipherment Engine- Augment and Extend the Useful Life of Your Encryption

Advances in crypt-analysis increase the risk of data breaches and unauthorized disclosure. Many believe that today’s strongest encryption algorithms have been broken. While there’s no cryptographic “silver bullet,” you can regain the advantage with Secure Channels’ patented Superencipherment Engine. The Engine's use of data segmentation and multilayer, multi-algorithm technology significantly increases the level of data protection over that provided by a single algorithm and key.

Superencipherment engine   leftstacked



The latin phrase SUBROSA® means “under the rose” and is used in English to denote secrecy or confidentiality.*

Semantically Meaningful Key Generation Eliminates Memorization Problems

SUBROSA® users choose unique data resources to generate their keys and establish a perso...

Proximity Technologies- The future is here.

See how IoT transforms every business.

The Internet of Things links together networks, devices, and data. It helps you learn more about every level of your business. With a billion-plus smart devices connected worldwide, the Internet of Things (IoT) is disrupting the way businesses operate—in a good way.

Machines like vehicles, appliances, cameras, alarms and more can be upgraded to be more aware of what’s happening in and around them. These machines are sharing information autonomously—actionable data that helps you respond quickly, become more productive or improving physical or human l...



Secure Channels Process Hardened Encryption and Resource Environment

With all of the recent cyber leaks, account breaches, unauthorized disclosures, and the like it would be fair to say that present data security not only is failing but has failed and that it doesn’t seem to matter what type of intrusion protection or security a system has. Eventually, as proven in the news, someone is going to get to the data in a manner that is unauthorized or ill...

Encryption Key Management

Certified. Comprehensive. Cost Effective.

Secure Channels Key Manager is an appliance that helps organizations meet compliance requirements with FIPS 140-2 compliant encryption key management. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Secure Channels Key Manager also supports on-appliance encryption and decryption services. Whether you want to run Secure Channels Key Manager as a physical hardware security module (HSM), as a VMware instance, or ...

Technology 1

Secure Channels Key Manager Cloud

Secure Channels Encryption & Key Management Hosted in the Cloud

Enterprises can now safely migrate applications to the cloud without deploying encryption key management in their own data centers. The Secure Channels Key Manager Cloud offers fully redundant, FIPS 140-2 compliant encryption key management for cloud applications running in Amazon Web Services, Microsoft Windows Azure, Rackspace,, and many other cloud environments.