Web Analytics
  • Secure Channels

Secure Channels PKMS2® Wins MVP Award From CTR

Secure Channels’ robust, state-of-the-art PKMS2® encryption renders all types of data fully protected and unreadable. It delivers unmatched security that protects all forms and types of data across the organization (in storage, transit or active use), even if a private cloud is hacked – and is an unbreakable encryption standard with zero induced lag.

OVERVIEW: Its Pattern Key Multi Segment, Multi Standard (PKMS2®) encryption provides data protection that’s orders of magnitude beyond the use of single key or protocol. PKMS2® breaks every file into varied-length segments, and then uses separate processes and patented methods to encrypt each segment individually. Data sets become ‘virtual patchworks’ of myriad variety, and the process prevents data from appearing as text or other cohesive content – even when decrypted.

ADDED ASSURANCE: Secure Channels also lets customers inject their own encryption algorithms into the SC encryption process pipeline, eliminating any potential for back door access and mining – even by Secure Channels’ own systems and personnel.

What sets this product apart?

THE END RESULT: unparalleled encryption that’s orders of magnitude more secure than all known security industry encryption methods, and begins where competitive products finish.

“It would take a supercomputer making 19 quadrillion calculations per second at nearly 30x the age of the universe to break the encryption of Secure Channels PKMS2®,” notes Secure Channels CEO Richard Blech

Additional differentiators & background:

  1. Uses current encryption standards (e.g. AES256) together with the company’s own patented protocols based on PKMS2®.syt

  2. Secure Channels’ mathematical encryption models with more than 350 patterns and an encryption-oriented scripting language, together with optional customer encryption processes.

  3. Flexibility: customers select their degree of security – from minimal for FIPS compliance to the company’s maximal security of a virtually impenetrable nature, or anywhere between.

  4. Secure traverse: endpoint-to-endpoint encryption, from data storage through transmission and to receiving endpoint, making the Cloud safer than a military data center.

For more information, visit: http://securechannels.com

Find the orginal post here.

#Irvine #PKMS2 #CyberSecurity #ComputerTechnologyReviewMVP #RichardBlech #Encryption #ComputerTechnologyReview #patentedencryption #SecureChannels

Secure Channels BRINGS to market data encryption, cryptographic protocols, and access control/ privileged access/ user authentication technologies in the form of licensable tools, end user platforms and purpose-built solutions, SERVING software & application developers, hardware OEM and device manufacturers, and enterprise organizations, WHO place a premium on cybersecurity, risk reduction, and operational performance benefits or competitive differentiation provided, ALLOWING them to replace, augment, or introduce to new cryptography into their products or environments, PROVIDING material and measurable cybersecurity protections, risk reduction and data breach mitigation.

Secure Channels Inc. 

16400 Bake Parkway, Suite 100  |  Irvine, CA 92618  |  T: (855) 825-6766  |  E: contact@securechannels.com

Follow us!

  • Facebook
  • LinkedIn
  • Twitter

Copyright © 2020 Secure Channels Inc. All rights reserved