'; $('#et-footer-nav').append(ssl_seal); }); });

Cryptographically Addressing Cybersecurity Gaps

Who We Are:     is a software development company based in Irvine, California.  Our experts engineer and develop high-performance, cost-effective cybersecurity technologies to protect organizations from present and emerging threats.

Our Mission: To provide award-winning, cryptanalyst-celebrated solutions including post-quantum cryptography, authentication and identity management systems.

What We Do: Offer advanced data protection, no-friction encryption, authentication, enterprise confidentiality solutions and proximity-based monitoring and intelligence capabilities.

Five Ways Secure Channels Addresses Cybersecurity Gaps

1. Unique, patented protection technologies for deployments routine and complex
2. Future-ready, compliant solutions resistant to emerging threats
3. Agnostic solutions for any industry
4. Affordable upgrades within outdated cybersecurity infrastructure
5. Industry-applauded, cryptanalyst-lauded innovations

Secure Channels Partners with Oregon Systems

Deal Extends SCI’s Cybersecurity Protection to Middle Eastern Critical Infrastructure

 

Secure Channels Inc. entered a three-year partnership with Oregon Systems, OT/Critical Infrastructure Focused Cyber Security solutions Distributor with value-added services.  The agreement grants Oregon Systems exclusive rights to distribute, resell and integrate Secure Channels’ state-of-the-art cyberdefense technologies throughout Kingdom of Saudi Arabia, Kingdom of Bahrain, United Arab Emirates, State of Kuwait and Sultanate of Oman.  Through its cybersecurity partnerships, Oregon Systems can now leverage Secure Channels’ dynamic cryptosystem, XOTIC®, toward safeguarding critical operational technology (OT) systems in the region.

Oregon Systems partnership with Secure Channels is the result of regional market demand of encryption to protect the region’s increasingly connected OT and critical infrastructure.  The company sought encryption prime for IoT integration with key lengths that will withstand brute-force attacks from advancing quantum threats.  Secure Channels’ XOTIC cryptosystem proved to be the sole cipher to encrypt at the required future-ready strengths, while being fast and adaptable to accommodate developing technology.

To view the complete article, click here

Encrypted Video Streaming

Whether you are streaming video, audio or both, XOTIC® can deliver a secure means to watch and archive the video while removing the concern of malicious parties accessing your feeds. Unlike other ciphers, implemented strictly for the long-term storage of media or used within TLS/SSL protocols that maintain a single secret key, XOTIC is constantly changing to protect your data. Implemented on the device itself, the XOTIC cipher re-keys data in transit with random quantum resilient key lengths ranging from 512-bit to 4,096-bits at set time intervals using Secure Channels’ patent pending Wave Form Encryption™ (WFE). Rest easy with your information stored on-premise or in the cloud with a flexible key exchange network that can shard and distribute the keys for the live feed on internationally distributed repeaters, mitigating the risk of any single point of failure in the security of your information. Protect your information today with a cipher that’s strong enough for post-quantum archival of data, but efficient enough to encrypt every frame of your media.

 

ZIPcrypt Review: A Revolutionary Encryption Tool

There is no doubt that ZIPcrypt is a winner in the current encryption software market. It is a novel product that can help organizations protect the confidentiality of their sensitive data. It is particularly useful for companies that deal with a heavy volume of data transfer through emails at different locations as stakeholders can utilize ZIPcrypt for complete privacy.

A fast and user-friendly application, ZIPcrypt works smoothly through SCIFCOM.com. One of the best aspects of SCIFCOM is that it allows the transfer of encrypted files as large as 300 MB – this means that you don’t have to worry about sending huge chunky data files safely anymore.

To read more, click here

 

Entropy Omission Leaves IoT Customers Vulnerable

Secure Channels Solution Delivers Security and Flexibility Essential to IoT

 

A recent report by cybersecurity firm Keyfactor revealed a significant weakness prevalent among IoT devices.  The group found that RSA cryptosystem keys protecting connected devices are generated with a staggering lack of entropy — the randomness that reduces an adversary’s ability to break the encryption.  Inherent design constraints in IoT technology hamper the effectiveness of classical cryptosystems like RSA.  Secure Channels Inc. has prepared a lightweight, stronger cryptosystem IoT manufacturers can better integrate into their products without sacrificing performance: XOTIC Core.

Keyfactor used modest resources to analyze 75 million RSA certificates acquired from the open Internet.  The group found a worrying level of repetition that could facilitate an adversary’s attack on targeted IoT devices.  The report is even more troubling considering the projected growth of IoT from the 23 billion connected devices deployed in 2018 to a forecast 76 billion by 2025.  Convenience, efficiency and misplaced trust in the devices have propelled their deployment to environments with higher stakes, despite the technology’s feeble security.  As noted by Keyfactor’s JD Kilgallin, “These devices are also now seen in increasingly sensitive settings, such as in operating rooms and automobiles. Consumers are also transmitting increasingly sensitive information over the Internet, including financial and personal-health data.”

To view the complete article, click here

Peer Reviews

Dr. Stanislaw Jarecki

Professor, School of Information and Computer Sciences, University of California at Irvine
“SKI offers strong security property vs. standard PKI-based and Kerberos-based secure key communication…”

Dr. Yevgeniy Dodis

Professor of Computer Science University of California, Santa Barbara
“PKMS2® provides an excellent way of protecting information against very powerful attacks.”

Dr. Stefano Tessaro

Assistant Professor of Computer Science University of California, Santa Barbara
“(I am) not aware of any other schemes (theoretical or practical) that achieve similar guarantees with…”

Dr. Matthew Green

Assistant Professor of Computer Science The Johns Hopkins University
“A number of results in the field of cryptography deal with the problem of double (or multiple) encipherment…”

Dr. Stanislaw Jarecki

Professor, School of Information and Computer Sciences, University of California at Irvine
“SKI offers strong security property vs. standard PKI-based and Kerberos-based secure key communication…”

Dr. Yevgeniy Dodis

Professor of Computer Science University of California, Santa Barbara
“PKMS2® provides an excellent way of protecting information against very powerful attacks.”

Dr. Stefano Tessaro

Assistant Professor of Computer Science University of California, Santa Barbara
“(I am) not aware of any other schemes (theoretical or practical) that achieve similar guarantees with…”

Dr. Matthew Green

Assistant Professor of Computer Science The Johns Hopkins University
“A number of results in the field of cryptography deal with the problem of double (or multiple) encipherment…”

Awards

Next Gen Encryption

Most Innovative Priviledge Account Security

Most Innovative Email Security and Management

Editor’s Choice Encryption

Winner – PKSM

Winner – SUBROSA©

Winner – xSOC

Cutting Edge Encryption

* ALL SCI products and solutions are backed by a $10 million cybersecurity insurance policy.