Our Data Services practice is led by one of the most sought after Consulting Engineers in the Big Data Analytics industry with a six year track record of success with some of the largest domestic and global clients across multiple industries. We recommend scheduling project planning calls with us as soon as new projects can be defined in order to ensure availability of resources.

In The News

encryption
CEO Richard Blech Quoted, Defending Encryption
Top global security experts defend encryption Security experts have published a paper arguing...
CEO Richard Blech Provides Expertise On NJ Hospital Hack
Encryption Expert on NJ Hospital Patient Data Breach Richard Blech, CEO and Co-Founder of...
Data Breach

Cloud Customers Faced 681M Cyberattacks in 2018

The most common attacks involved software vulnerabilities, stolen credentials, Web...
10 Young Companies To Watch

Secure Channels Inc Named In Network World’s 10 Young Companies To Watch

One common thread is helping to make detection and remediation easier A wealth of young...
Richard Blech

Secure Channels Inc. CEO, Richard Blech at Cloud Expo Silicon Valley

Richard Blech, CEO of Secure Channels Inc., talks to SYS-CON.tv at Cloud Expo Silicon Valley...

Data Services and your Business

ETL Optimization

Recommending the right tool mix for the successful ingestion, transformation and publishing of data to operational and analytics users for downstream consumption for such tools as Informatica and Tableau, and analytics users such as KNIME and Spark.

Cluster Heath Check and Performance Optimization

Performing detailed analysis of existing environments and make actionable recommendations to improving operational efficiency and return on technology investments.

Data Migration

Project lead data migrations from one big data distribution to another with zero downtime and a smooth transition for customer’s staff and customers.

ZFS Deployment and Migration

Performing deployments and migrations to the ZFS file system which has features and benefits not found in any other non-distributed file system available today and is an excellent file system for demanding applications such as Percona/MySQL and other, critical infrastructure services.

Technology in the News

Suspected State-Sponsored Hackers Pummel US and Australia

Dozens of companies in the U.S. and political parties in Australia have been targeted in recent attacks that appear to have state sponsorship. Did you enjoy this article? Then read the full version from the author's...

Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies

SAN FRANCISCO — Businesses and government agencies in the United States have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts believe have been energized by President Trump’s withdrawal from the Iran nuclear deal la Did you enjoy...

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

All these numbers…. Now, a new set of databases containing millions of hacked accounts from several websites has been made available for sale on the dark web marketplace by the same hacker who goes by online alias Gnosticplayers. Did you enjoy this article? Then read...

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale from today on the dark web, according the data trove's seller. Did you enjoy this article? Then read the full version from the author's...

Cybercriminals Exploit Gmail Feature to Scale Up Attacks

Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple fraudulent accounts on websites, using variations of the same email address, Agari says. Did you enjoy this article? Then read the full version from the author's...

191 Million US Voter Registration Records Leaked In Mystery Database

A whitehat hacker has uncovered a database sitting on the Web containing various pieces of personal information related to 191 million American citizens registered to vote. Did you enjoy this article? Then read the full version from the author's...

Cloud Customers Faced 681M Cyberattacks in 2018

The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices. Cloud customers were hit with 681 million cyberattacks last year, according to analysts at cloud security provider Armor, which recently analyzed cloud...

7 Key Elements of a Successful Encryption Strategy

The most common method of protecting data in motion is the use of a secure sockets layer virtual private network (SSL VPN). Technologies such as SSL VPN are critical in the effort to protect against man-in-the-middle attacks and packet sniffers. Did you enjoy this...

Data breach attack surfaces to expand in 2019

When it comes the gauging the newsworthiness of a story, there’s an old adage in journalism that reporters should ask themselves whether or not the story is of the “dog bites man” or “man bites dog” variety. Did you enjoy this article? Then read the full version from...

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1" is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique...

SCI Solutions Using Data Services Technology

SCI Subsidiaries Using Data Services Technology

What is Data Services?

Cluster Design and Implementation

Working with customers to determine the optimal tool mix and topology delivering highly-available, production-ready frameworks, able to handle the most demanding and scalable workloads from day one.

Mentoring and Training

Mentoring and training big data staff and data scientists enabling companies to optimize returns on their big data investments.

Data Science Services

Performing use case discovery, model development and training, developing production ready machine learning, documented and ready to deploy, adding intelligence to business operations while enriching the value of existing data. Real-time streaming solutions with repeatable, verifiable results with world class training and documentation.

 

White Papers & Resources