Cryptoscan is an encryption specific analysis, audit, and reporting tool that enables users to perform deeps inspections of assets for cryptographic artifacts. Cryptoscan scans servers, network services, and endpoints.

Cryptoscan helps organizations achieve compliance with data protection regulations, assess post quantum readiness, and detect and mitigate cryptographic threats like ransomware and malware.

In The News

PKMS2
Secure Channels Inc. Releases Peer Review Report On Security Analysis Independently Validating Patented PKMS2 Encryption Protocol
Research & analysis conducted independently by Dr. Matthew Green, Dr. Stefano Tessaro, and Dr....
Chinese Hackers
Richard Blech Comments On Chinese Hackers
Study: Chinese Hackers Are Savvy, Surgical A clandestine group of sophisticated Chinese...
North Korea Is Still Trying to Hack US Critical Infrastructure
The ongoing cyber campaign seeks to infiltrate defense, financial, energy, telecom, and...
Internet of Things

How IoT is reshaping the cybersecurity landscape

By Richard Blech, CEO of Secure Channels Inc. The rise of connected devices has led to new...
Gemalto

CEO Blech Quoted By Ecommerce Times: Gemalto And The NSA

Government Spies Came Up Dry, Says Gemalto Gemalto acknowledged that NSA and GCHQ spies may...
Secure Channels

Secure Channels Announces New Security Products at RSA Conference 2015

Secure Channels Inc. Announces New Security Products for Payment Processing, Encrypted Storage...

Cryptoscan and my Business

  • Proactively hunts, identifies, inventories and all cryptographic algorithms and certificates in the environment
  • Provides visibility into HOW and WHERE any form of encryption is being used in enterprise environments
  • Mitigates against crypto-threats where traditional “security audit” tools fall short
  • Provides both Regulatory Compliance and Post-Quantum readiness scans and reporting

Technology in the News

Six Reasons why Encryption isn’t working — Guardtime

Close to 95% of all enterprise networks have already been compromised by external attackers. Only 3 percent of U.S. organizations felt safe against insider threats. The loss of intellectual property from Fortune 500 firms alone has been described as the largest wealth...

Six Reasons why Encryption isn’t working — Guardtime

Close to 95% of all enterprise networks have already been compromised by external attackers. Only 3 percent of U.S. organizations felt safe against insider threats. The loss of intellectual property from Fortune 500 firms alone has been described as the largest wealth...

Equifax’s Data Breach Costs Hit $1.4 Billion

Credit reporting giant Equifax has spent nearly $1.4 billion on cleanup costs as well as overhauling its information security program following its massive 2017 data breach. Did you enjoy this article? Then read the full version from the author's...

Cybersecurity Trends For 2019 – The Escalating War Against Encryption, Privacy, And Security

By Richard Blech  December 20, 2018 The year 2018 saw the opening salvos of a Cold War. One side of the ongoing conflict is information technology companies, civil libertarians, privacy advocates, and academics. The other side is a multi-government coalition largely...

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

What is Cryptoscan?

 

  • Encryption-specific audit & assessment tool
  • Does what other assessment tools can’t
  • Performs deep inspection for cryptographic artifacts
  • Scans network services, servers, endpoints
  • Executive dashboard for daily use & monitoring
  • Extensive reporting options:
    • Legitimate, weak, or missing encryption
    • Rogue encryption (likely ransomware)