Secure Channels offers advanced data protection, adaptable encryption, authentication, and enterprise confidentiality solutions.
CRYPTOGRAPHICALLY ADDRESSING CYBERSECURITY GAPS
SECURE SENSITIVE DATA WITH OUR CRYPTOGRAPHIC SERVICES PORTAL
# Easy-to-use, future-ready cybersecurity solutions
# Safe message sending
# Downloadable plugins, utilities and developer tools
# Token authority for simpler, more secure PKI alternative
# Improved cybersecurity control
WHAT IS SCIFCOM™
The Secure Channels SCIFCOM™ portal is your gateway to innovative, effective security solutions designed to complement existing investments in security.
True double-blinded Token Exchange (encryption key distribution)
Uses Oauth, HTTPS, and TLS
Secure communications between clients and servers during the Token Exchange process
The process utilizes a worldwide satellite network infrastructure
Advances in quantum computing will render (PKI) insecure
SCIFCOM™ DOES NOT use the current (PKI) key exchange process which has been widely criticized for being vulnerable to attack.
OUR SECURE CLOUD WORKSPACE
FILE & DATA ENCRYPTION
POST-QUANTUM SECURE CRYPTOGRAPHIC SOFTWARE AS A SERVICE
ENTER THE PORTAL TO OUR DATA ENCRYPTION SOLUTION
SCIFCOM™ WHITE PAPERS & RESOURCES
AUTHENTICATE USERS WITH IMAGES
# Intuitive user access experience
# More secure alternative to vulnerable passwords
# Customizable, brandable image-based login interface
# Easy-to-remember image patterns reduce forgotten-password help calls
# Security, simplicity and memorability promote excellent “authentication hygiene”
WHAT IS SUBROSA©
SUBROSA©, available at SCIFCOM™, is an authentication gateway that can be seamlessly integrated into distributed applications for enhanced network security. As a single factor in a multifactor authentication process, or as a standalone password replacement. SUBROSA© mitigates the risks associated with social engineering attacks, such as credential stuffing, dictionary attacks, or phishing.
More secure than PINS or user-generated passwords
Users choose their own pictures or digital images then select an easy to remember tile pattern
Cryptographic key generation tool
Replaces hard to remember passwords and PINS with easy to remember picture tiles
Converts tile pattern into a very long encrypted password/ log-in (65,000 characters min.)
SUBROSA© & YOUR BUSINESS
# Authentication factor and cryptographic key generation tool
# More secure than PINS or user-generated passwords
# SUBROSA© exceeds “Password Best Practices”
# Passwords are very long, random, encrypted, difficult to socially engineer
Hackers are using more advanced techniques to find a backdoor into your organization’s data and text-based passwords are one of the weakest points in network security. While common best practices include the cycling of complex passwords every 30-90 days and preventing re-use of old passwords, this has created a new problem. Users start to use permutations of their previous passwords, simple passwords that are memorable, or even keep a list of their passwords that, if exposed, could put organizational security at significant risk. SUBROSA© addresses these risks by introducing a simple and secure visual password. Users have the option to create their passwords using SUBROSA©’s default imagery or load their own photos which are then presented in a 4x4, 6x6, or 8x8 grid. Once the images have been selected the password is the result of a sequence of grid tiles that a user selects from within any combination of photo imagery.
While the interface is simple, the underlying architecture powering the visual security algorithm is highly sophisticated. SUBROSA© passwords created by selecting only four tiles from memorable images creates a password that’s equivalent to a text password of more than 65,000 characters in length. The strength of SUBROSA©’s password is the result of each pixel within each tile outputting a cryptographically secure hash. In other words, SUBROSA© lets users create a simple and memorable password that’s extremely resistant to modern hacking techniques.
SUBROSA© comes complete with a developer toolkit and sandbox for evaluation prior to deployment.
SUBROSA© WHITE PAPERS & RESOURCES
PROTECTS ENCRYPTED DATA AT ENDPOINTS
# Strong, scalable encryption
# Data protection for vulnerable endpoints
# Quick, simple deployment at enterprise scale
# Augments existing security investments
# Improved control over protected data
WHAT IS PARADOXBOX™
ParaDoxBox™ is a SaaS-based, data security solution that protects data where it is most vulnerable – at the edge. It fills current gaps in endpoint security exacerbated by workforce trends that are increasingly emphasizing flexibility and work-from-anywhere policies.
Can be easily deployed to all of an organization’s laptops and workstations
Can be used to provide any desired combination of full disk, partition, volume, hidden volume, and file encryption
Data Security Platform
Creates encrypted virtual containers on endpoints, providing protection levels that meet or exceed industry and national standards
transparent once deployed, requiring no specialized training.
Goes well-beyond BitLocker-style Full Drive Encryption (FDE)
PARADOXBOX™ & YOUR BUSINESS
# Protects data across devices, drives, partitions, volumes, files & Cloud storage
# Can be customized on the enterprise’s unique needs and configurations
# Enables enterprises to securely share data with internal users & external partners
# At the same time, the enterprise retains full control and access to all its data