When AES (Advanced Encryption Standard) was first published in 2001, the volumes of data held in a digital form were vastly smaller than the volumes of today. AES 256 is the highest, strongest standard encryption algorithm. However, it is a very heavy algorithm with a large key and block size for the total amount of the data volume that is now encrypted. It is also frequently not deployed efficiently. The result is causing significant degradation to the speed and movement with which data flows through an enterprise’s infrastructure. As CPU power continues to regularly increase along with the sophistication of hackers’ capabilities, the effectiveness of the single remaining highest standard, AES256, will continue to decrease.
1) No Encryption – Numerous hacks like OPM, JP Morgan Chase, SONY did not encrypt their sensitive data which was ultimately stolen.
2) Ineffective Encryption – High quality encryption may be deployed in ways that are not effective. Data may be encrypted on-the-wire, but not on disk, or vice versa. The keys used for encryption may not be protected, or managed in a way that allows too-ready availability.
3) Weak Encryption or poor encryption management – Many existing solutions are complex, resource heavy, and open to specialized attacks on AES Keys.
4) Reliance on Legacy Solutions – Hackers successfully attack AES, 3DES and the single-source key management systems that support them. Once broken, legacy systems remain broken, and the knowledge of how to break them spreads. SSL has been replaced with TLS because it is broken. The current version of TLS will be 1.3 very soon because the earlier versions all have weaknesses which hackers are learning how to exploit. Independent of those protocol weaknesses, there is little or no support for deploying TLS in a way which can resist State sponsored attacks and hackers will gain the ability to use similar techniques. LEGACY SYSTEMS DO NOT WORK against today’s sophisticated hacker’s capabilities.
Effective - Existing/Legacy solutions have been compromised and open to multiple attack vectors. Secure Channels targets the top attack vectors and hardens exposed environments.
Secure - When data is encrypted at the core with Secure Channel’s encryption process, the hacker is left with useless bits and bytes, not sensitive information.
Fast – PKMS2 increases the speed of encryption substantially. (10x to 12x for a majority of files) The overhead of our encryption process is not noticeable.
Easy – The SCI encryption engine is easy to deploy, light, and “plug & play”. It integrates seamlessly within the Enterprise infrastructure.
Cost Efficient – Secure Channels is the most cost effective option vs. competitors.
Future Proof – Our Patented encryption process can be slipstreamed, work as an agent, middleware, or plugin. It is agnostic to all data types and user-defined, allowing the user to decide the levels of hardening above AES256 that is desired.
If you spend the effort & money, shouldn’t your encryption solution work? – SafeNet, FireEye, Thales, Symantec, CISCO and several major providers have been compromised. Off-the-shelf solutions are vulnerable. Designed Intelligent Encryption as a Service, or user-defined customized encryption, is the surest way to protect sensitive data at its core within the security stack.