The ParaDoxBox™ encryption management platform incorporates a rich feature set of functionality for any size organization.

ParaDoxBox™ Enterprise combines our endpoint encryption management platform with our flexible cloud-based administration interface to offer organizations the versatility to manage full disk, partition, and file level encryption as well as cloud hosted data.

PKMS2 improves the security of your critical data and extends the useful life of current encryption algorithms through a patented use of layering and segmentation encryption techniques, providing exponentially stronger encryption compared to using single algorithms.

In The News

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts
Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale...
Security Breaches
CEO Richard Blech Talks Security Breaches – From the GRC-Daily
From the GRC-Daily: Epidemic of Security Breaches “Banks are one of the most vulnerable and...
25% of companies affected by cloud cryptojacking
Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention,...

URGENT WARNING: How To Protect Every Lazy U.S. Citizen From Cyber Attack

Published on December 10, 2018 Steve Morgan Publisher at Cybersecurity Ventures, the world’s...
net neutrality

Secure Channels’ Henry Sienkiewicz Comments on Net Neutrality

Will the end of net neutrality be a security nightmare? Effects of the net neutrality repeal...
Secure Channels

Secure Channels Announces New Encryption Patents

Secure Channels Inc. Announces New Encryption Patents and New Partnership Opportunities With...

ParaDoxBox and your Business

The ParaDoxBox™ Data Security Platform incorporates rich enterprise administration features as well as Secure Channels’ patented PKMS2 (Pattern Key−Multi-Segment−Multi-Standard) mode of operation. Built to be customized for the enterprise environment.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or be ill-prepared in protecting every endpoint. Secure Channels’ ParaDoxBox™ Data Security Platform fills these gaps by providing administrators an intuitive, user-friendly, comprehensive management interface while providing a wide array of encryption options and enterprise management functionality – ensuring positive control over users, billing, and data access.

ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state. OTFE incorporates the PKMS2 Protocol, best of breed symmetric ciphers, enhanced authentication technology, and enterprise controls for key management, account management and billing. ParaDoxBox offers enhanced security that flexibly supports enterprise requirements.

  • Intuitive, easy-to-use interface
  • Pervasive Encryption
  • Bypass and Social Engineering Attack Protection
  • Protects device, network and Cloud storage locations
  • Users choose encryption scope (disk, partition, volume, file, share, Cloud location, etc.), storage locations and the algorithms and modes of operation that encrypt data
  • Incorporates PKMS2 and SUBROSA® multifactor authentication

Technology in the News

Suspected State-Sponsored Hackers Pummel US and Australia

Dozens of companies in the U.S. and political parties in Australia have been targeted in recent attacks that appear to have state sponsorship. Did you enjoy this article? Then read the full version from the author's...

Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies

SAN FRANCISCO — Businesses and government agencies in the United States have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts believe have been energized by President Trump’s withdrawal from the Iran nuclear deal la Did you enjoy...

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

All these numbers…. Now, a new set of databases containing millions of hacked accounts from several websites has been made available for sale on the dark web marketplace by the same hacker who goes by online alias Gnosticplayers. Did you enjoy this article? Then read...

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale from today on the dark web, according the data trove's seller. Did you enjoy this article? Then read the full version from the author's...

Cybercriminals Exploit Gmail Feature to Scale Up Attacks

Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple fraudulent accounts on websites, using variations of the same email address, Agari says. Did you enjoy this article? Then read the full version from the author's...

191 Million US Voter Registration Records Leaked In Mystery Database

A whitehat hacker has uncovered a database sitting on the Web containing various pieces of personal information related to 191 million American citizens registered to vote. Did you enjoy this article? Then read the full version from the author's...

Cloud Customers Faced 681M Cyberattacks in 2018

The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices. Cloud customers were hit with 681 million cyberattacks last year, according to analysts at cloud security provider Armor, which recently analyzed cloud...

7 Key Elements of a Successful Encryption Strategy

The most common method of protecting data in motion is the use of a secure sockets layer virtual private network (SSL VPN). Technologies such as SSL VPN are critical in the effort to protect against man-in-the-middle attacks and packet sniffers. Did you enjoy this...

Data breach attack surfaces to expand in 2019

When it comes the gauging the newsworthiness of a story, there’s an old adage in journalism that reporters should ask themselves whether or not the story is of the “dog bites man” or “man bites dog” variety. Did you enjoy this article? Then read the full version from...

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1" is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique...

SCI Solutions Using ParaDoxBox Technology

SCI Subsidiaries Using ParaDoxBox Technology

What is ParaDoxBox?

ParaDoxBox™ creates encrypted virtual containers on endpoints, networks or in the Cloud, providing protection levels that meet or exceed industry and national standards. It is transparent once deployed, requiring no specialized training. Users select the encryption algorithms and the standards with which to comply (e.g., FIPS 140-2 Annex A). ParaDoxBox™ also supports superencipherment, layering and combining multiple encryption algorithms while (optionally) remaining FIPS compliant as well as utilizing Secure Channels’ SUBROSA® authentication technology. Even in the event the network is breached, ParaDoxBox™ ensures that your data is safe.

Pervasive Encryption
The ParaDoxBox™ Data Security Platform can be easily deployed to all of an enterprise’s laptops and workstations (either by download, isolated sandbox environment, or group policy installation). Once installed and registered, it can be used to provide any desired combination of full disk, partition, volume, hidden volume, file and file-for-sharing encryption at the administrator’s discretion. All users can encrypt all data, all the time. ParaDoxBox’s administrative functionality guarantees that the enterprise retains complete, secure control of keys, ensuring data access.

Computational Future Proofing
The ParaDoxBox™ Data Security Platform incorporates Secure Channels’ PKMS2 E3 Protocol encryption that has been mathematically proven* to extend the effective key length of standard 256-bit ciphers by approximately 50% to 387 bits. As a result, the use of ParaDoxBox™ provides security guarantees against both conventional and quantum improvements in computing power. These versions also provide fallback security: Even if one of the ParaDoxBox™ encryption suite’s ciphers is found to be insecure, data using the PKMS2 E3 Protocol remains protected. Additionally, the effort an attacker must exert to recover an entire message is significantly increased.

Bypass and Social Engineering Attack Protection
The ParaDoxBox™ Data Security Platform all but eliminates the threat of bypass and social engineering attacks using Secure Channel’s SUBROSA® technology, which provides a multifactor authentication gateway to ParaDoxBox™, supporting knowledge, possession, biometric, machine inherence and external location based manage knowledge factor authentication credentials that can be tailored or combined based on enterprise requirements to provide the desired level of authentication assurance. SUBROSA’s credentials technology are long (thousands or tens of thousands of bits), non-human readable, binary strings that are unknown to but easily entered by the user. Users can’t reveal what they don’t know and they can’t share what they can’t read or write down.

*A mathematical analysis of PKMS2 was conducted by Dr. Jonathan Katz, Vice President of Cryptography Engineering, Secure Channels Inc., Professor, Computer Sciences, University of Maryland. Cryptoanalysis conducted by Dr. Yevgeniy Dodis, Professor, Computer Science, Courant Institute of Mathematical Sciences, NYU; Dr. Matthew Green, Assistant Professor, Computer Science, The Johns Hopkins University; Dr. Stefano Tessaro, Assistant Professor, Computer Science, University of California, Santa Barbara.