'; $('#et-footer-nav').append(ssl_seal); }); });

Secure Channels Data Services

Our Data Services practice is led by one of the most sought after Consulting Engineers in the Big Data Analytics industry with a six year track record of success with some of the largest domestic and global clients across multiple industries. We recommend scheduling project planning calls with us as soon as new projects can be defined in order to ensure availability of resources.

Data Services and your Business

ETL Optimization

Recommending the right tool mix for the successful ingestion, transformation and publishing of data to operational and analytics users for downstream consumption for such tools as Informatica and Tableau, and analytics users such as KNIME and Spark.

Cluster Heath Check and Performance Optimization

Performing detailed analysis of existing environments and make actionable recommendations to improving operational efficiency and return on technology investments.

Data Migration

Project lead data migrations from one big data distribution to another with zero downtime and a smooth transition for customer’s staff and customers.

ZFS Deployment and Migration

Performing deployments and migrations to the ZFS file system which has features and benefits not found in any other non-distributed file system available today and is an excellent file system for demanding applications such as Percona/MySQL and other, critical infrastructure services.

What is Data Services?

Cluster Design and Implementation

Working with customers to determine the optimal tool mix and topology delivering highly-available, production-ready frameworks, able to handle the most demanding and scalable workloads from day one.

Mentoring and Training

Mentoring and training big data staff and data scientists enabling companies to optimize returns on their big data investments.

Data Science Services

Performing use case discovery, model development and training, developing production ready machine learning, documented and ready to deploy, adding intelligence to business operations while enriching the value of existing data. Real-time streaming solutions with repeatable, verifiable results with world class training and documentation.


SCI Solutions Using Data Services Technology

SCI Subsidiaries Using Data Services Technology

White Papers & Resources

In The News

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts
Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale...
Equifax’s Data Breach Costs Hit $1.4 Billion
Credit reporting giant Equifax has spent nearly $1.4 billion on cleanup costs as well as...
Secure Channels Inc. Offers New Protocol to Vastly Improve AES-256 Encryption
Patented protocol offers 50 percent increase in bit strength IRVINE, Calif., Oct. 11, 2017...

A Remedy For Bad Crypto

Published on November 20, 2018 Edward Amoroso  Follow Founder and CEO of TAG Cyber 243...
Sylvia Burns

Statement of Sylvia Burns Before The House Committee On Information Technology



155 Hackers took the “Can You Break This” Challenge; None Could Break Secure Channels’ New...

Technology in the News

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

‘Harvesting Attacks’ & the Quantum Revolution

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now. The Information Age replaced industrial equipment with data. Did you enjoy this article?...