ENTERPRISE

The ParaDoxBox™ Enterprise encryption management platform is locally installed endpoint software that incorporates a rich feature set of functionality for any size organization.

ParaDoxBox™ Enterprise combines our endpoint encryption management platform with our flexible cloud-based administration interface to offer organizations the versatility to manage full disk, partition, and file level encryption as well as cloud hosted data.

 

In The News

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords
There’s no shortage of data breaches these days, but this one should...
Interior Department
IG: Interior Has 3,000 Vulnerabilities
House Panels Explore Link Between Interior IT, OPM Breach. CEO Richard Blech Comments.   While...
Self-driving cars could soon navigate the world via micropayments
With autonomous vehicles already debuting on our roads and in our airspace, you’ve probably...

Marriott may face GDPR fine of more than £17m

Marriott International could face a multimillion-pound fine in Europe, following news that the...
Dyre Wolf

Richard Blech Comments On Dyre Wolf Malware

Experts comment on Dyre Wolf Malware, Including Cyber Security CEO Richard Blech In...
PCI Compliance

Maintaining PCI Compliance a Challenge by Richard Blech

The newly issued PCI Compliance Report from Verizon is quite telling as to how under-reported...

ParaDoxBox and your Business

*Upgrading ParaDoxBox with SCI licensed technologies SUBROSA and PKMS2, creates a data security platform.

The ParaDoxBox™ Data Security Platform incorporates rich enterprise administration features as well as Secure Channels’ patented PKMS2 (Pattern Key−Multi-Segment−Multi-Standard) mode of operation. Built to be customized for the enterprise environment.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or be ill-prepared in protecting every endpoint. Secure Channels’ ParaDoxBox™ Data Security Platform fills these gaps by providing administrators an intuitive, user-friendly, comprehensive management interface while providing a wide array of encryption options and enterprise management functionality – ensuring positive control over users, billing, and data access.

ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state. OTFE incorporates the PKMS2 Protocol, best of breed symmetric ciphers, enhanced authentication technology, and enterprise controls for key management, account management and billing. ParaDoxBox offers enhanced security that flexibly supports enterprise requirements.

  • Intuitive, easy-to-use interface
  • Pervasive Encryption
  • Bypass and Social Engineering Attack Protection
  • Protects device, network and Cloud storage locations
  • Users choose encryption scope (disk, partition, volume, file, share, Cloud location, etc.), storage locations and the algorithms and modes of operation that encrypt data
  • Incorporates PKMS2 and SUBROSA® multifactor authentication

Technology in the News

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

Quantum computing will break your encryption in a few years

Quantum computers – those that use the principles of quantum entanglement and superposition to represent information, instead of electrical bits – are capable of performing certain types of calculation orders of magnitude more quickly than classical, electronic...

Nielsen warns US ‘not prepared’ for foreign cyberattacks

Homeland Security Secretary Kirstjen Nielsen on Monday called for the U.S. to take on a “whole of society” approach to combat cyber threats, saying the U.S. “is not prepared” to handle hackers backed by other countries. “It’s not just U.S. Did you enjoy this article?...

These Are the Worst Corporate Hacks of All Time

As business processes and personal information move online, the number of data hacks is growing. Some are minor and go undetected, while others are so major that they can put an entire company at risk. Hacks ranged from a few million records exposed to several...

North Korea Is Still Trying to Hack US Critical Infrastructure

The ongoing cyber campaign seeks to infiltrate defense, financial, energy, telecom, and healthcare firms. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using ParaDoxBox Technology

SCI Subsidiaries Using ParaDoxBox Technology

SCI Licensed Upgrades Available

What is ParaDoxBox?

*Upgrading ParaDoxBox with SCI licensed technologies SUBROSA and PKMS2, creates a data security platform.

ParaDoxBox™ creates encrypted virtual containers on endpoints, networks or in the Cloud, providing protection levels that meet or exceed industry and national standards. It is transparent once deployed, requiring no specialized training. Users select the encryption algorithms and the standards with which to comply (e.g., FIPS 140-2 Annex A). ParaDoxBox™ also supports superencipherment, layering and combining multiple encryption algorithms while (optionally) remaining FIPS compliant as well as utilizing Secure Channels’ SUBROSA® authentication technology. Even in the event the network is breached, ParaDoxBox™ ensures that your data is safe.

Pervasive Encryption
The ParaDoxBox™ Data Security Platform can be easily deployed to all of an enterprise’s laptops and workstations (either by download, isolated sandbox environment, or group policy installation). Once installed and registered, it can be used to provide any desired combination of full disk, partition, volume, hidden volume, file and file-for-sharing encryption at the administrator’s discretion. All users can encrypt all data, all the time. ParaDoxBox’s administrative functionality guarantees that the enterprise retains complete, secure control of keys, ensuring data access.

Computational Future Proofing
The ParaDoxBox™ Data Security Platform incorporates Secure Channels’ PKMS2 mode of operation that has been mathematically proven* to extend the effective key length of standard 256-bit ciphers by approximately 50% to 387 bits. As a result, the use of ParaDoxBox™ provides security guarantees against both conventional and quantum improvements in computing power. These versions also provide fallback security: Even if one of the ParaDoxBox™ encryption suite’s ciphers is found to be insecure, data using the PKMS2 mode of operation remains protected. Additionally, the effort an attacker must exert to recover an entire message is significantly increased.

Bypass and Social Engineering Attack Protection
The ParaDoxBox™ Data Security Platform all but eliminates the threat of bypass and social engineering attacks using Secure Channel’s SUBROSA® technology, which provides a multifactor authentication gateway to ParaDoxBox™, supporting knowledge, possession, biometric, machine inherence and external location based manage knowledge factor authentication credentials that can be tailored or combined based on enterprise requirements to provide the desired level of authentication assurance. SUBROSA’s credentials technology are long (thousands or tens of thousands of bits), non-human readable, binary strings that are unknown to but easily entered by the user. Users can’t reveal what they don’t know and they can’t share what they can’t read or write down.

*A mathematical analysis of PKMS2 was conducted by Dr. Jonathan Katz, Vice President of Cryptography Engineering, Secure Channels Inc., Professor, Computer Sciences, University of Maryland. Cryptoanalysis conducted by Dr. Yevgeniy Dodis, Professor, Computer Science, Courant Institute of Mathematical Sciences, NYU; Dr. Matthew Green, Assistant Professor, Computer Science, The Johns Hopkins University; Dr. Stefano Tessaro, Assistant Professor, Computer Science, University of California, Santa Barbara.