ENTERPRISE

The ParaDoxBox™ Enterprise encryption management platform is locally installed endpoint software that incorporates a rich feature set of functionality for any size organization.

ParaDoxBox™ Enterprise combines our endpoint encryption management platform with our flexible cloud-based administration interface to offer organizations the versatility to manage full disk, partition, and file level encryption as well as cloud hosted data.

 

In The News

ZIPcrypt Review: A Revolutionary Encryption Tool
By SoftwareSugges We’re living in a hyper-digital era and never before has cryptography...
7 Key Elements of a Successful Encryption Strategy
The most common method of protecting data in motion is the use of a secure sockets layer...
security breaches
Iranian-backed hackers ransacked Citrix, swiped 6TB+ of emails, docs, secrets, claims cyber-biz
Updated Citrix today warned its customers that foreign hackers romped through its internal...
Skills shortage

The Risks And Far-Reaching Impacts Of The Cybersecurity Skills Shortage

The Risks And Far-Reaching Impacts Of The Cybersecurity Skills Shortage By Richard...
encryption

CEO Richard Blech Quoted, Defending Encryption

Top global security experts defend encryption Security experts have published a paper arguing...
Secure Channels

Proactively Managing Data Compliance With Encryption Strategies

By Richard Blech The looming General Data Protection Regulation (GDPR) poses a significant...

ParaDoxBox and your Business

*Upgrading ParaDoxBox with SCI licensed technologies SUBROSA© and PKMS2®, creates a data security platform.

The ParaDoxBox™ Data Security Platform incorporates rich enterprise administration features as well as Secure Channels’ patented PKMS2® (Pattern Key−Multi-Segment−Multi-Standard) mode of operation. Built to be customized for the enterprise environment.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or be ill-prepared in protecting every endpoint. Secure Channels’ ParaDoxBox™ Data Security Platform fills these gaps by providing administrators an intuitive, user-friendly, comprehensive management interface while providing a wide array of encryption options and enterprise management functionality – ensuring positive control over users, billing, and data access.

ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state. OTFE incorporates the PKMS2® Protocol, best of breed symmetric ciphers, enhanced authentication technology, and enterprise controls for key management, account management and billing. ParaDoxBox offers enhanced security that flexibly supports enterprise requirements.

  • Intuitive, easy-to-use interface
  • Pervasive Encryption
  • Bypass and Social Engineering Attack Protection
  • Protects device, network and Cloud storage locations
  • Users choose encryption scope (disk, partition, volume, file, share, Cloud location, etc.), storage locations and the algorithms and modes of operation that encrypt data
  • Incorporates PKMS2® and SUBROSA©® multifactor authentication

Technology in the News

ZIPcrypt Review: A Revolutionary Encryption Tool

By SoftwareSugges We’re living in a hyper-digital era and never before has cryptography attained such massive importance in our lives. Organizations all over the globe have realized the value of encryption tools to ensure that their data is protected in transit and...

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using ParaDoxBox Technology

SCI Subsidiaries Using ParaDoxBox Technology

SCI Licensed Upgrades Available

What is ParaDoxBox?

*Upgrading ParaDoxBox with SCI licensed technologies SUBROSA© and PKMS2®, creates a data security platform.

ParaDoxBox™ creates encrypted virtual containers on endpoints, networks or in the Cloud, providing protection levels that meet or exceed industry and national standards. It is transparent once deployed, requiring no specialized training. Users select the encryption algorithms and the standards with which to comply (e.g., FIPS 140-2 Annex A). ParaDoxBox™ also supports superencipherment, layering and combining multiple encryption algorithms while (optionally) remaining FIPS compliant as well as utilizing Secure Channels’ SUBROSA©® authentication technology. Even in the event the network is breached, ParaDoxBox™ ensures that your data is safe.

Pervasive Encryption
The ParaDoxBox™ Data Security Platform can be easily deployed to all of an enterprise’s laptops and workstations (either by download, isolated sandbox environment, or group policy installation). Once installed and registered, it can be used to provide any desired combination of full disk, partition, volume, hidden volume, file and file-for-sharing encryption at the administrator’s discretion. All users can encrypt all data, all the time. ParaDoxBox’s administrative functionality guarantees that the enterprise retains complete, secure control of keys, ensuring data access.

Computational Future Proofing
The ParaDoxBox™ Data Security Platform incorporates Secure Channels’ PKMS2® mode of operation that has been mathematically proven* to extend the effective key length of standard 256-bit ciphers by approximately 50% to 387 bits. As a result, the use of ParaDoxBox™ provides security guarantees against both conventional and quantum improvements in computing power. These versions also provide fallback security: Even if one of the ParaDoxBox™ encryption suite’s ciphers is found to be insecure, data using the PKMS2® mode of operation remains protected. Additionally, the effort an attacker must exert to recover an entire message is significantly increased.

Bypass and Social Engineering Attack Protection
The ParaDoxBox™ Data Security Platform all but eliminates the threat of bypass and social engineering attacks using Secure Channel’s SUBROSA©® technology, which provides a multifactor authentication gateway to ParaDoxBox™, supporting knowledge, possession, biometric, machine inherence and external location based manage knowledge factor authentication credentials that can be tailored or combined based on enterprise requirements to provide the desired level of authentication assurance. SUBROSA©’s credentials technology are long (thousands or tens of thousands of bits), non-human readable, binary strings that are unknown to but easily entered by the user. Users can’t reveal what they don’t know and they can’t share what they can’t read or write down.

*A mathematical analysis of PKMS2® was conducted by Dr. Jonathan Katz, Vice President of Cryptography Engineering, Secure Channels Inc., Professor, Computer Sciences, University of Maryland. Cryptoanalysis conducted by Dr. Yevgeniy Dodis, Professor, Computer Science, Courant Institute of Mathematical Sciences, NYU; Dr. Matthew Green, Assistant Professor, Computer Science, The Johns Hopkins University; Dr. Stefano Tessaro, Assistant Professor, Computer Science, University of California, Santa Barbara.