The ParaDoxBox™ encryption management platform is locally installed endpoint software that incorporates a rich feature set of functionality for any size organization.

ParaDoxBox™ offers organizations the versatility to create full disk, partition, and file level encryption.

In The News

Why Do Organizations Continue to Struggle with Cryptography?
Written by Richard Henderson, CTO of InfoSec Global, North America. In the age of...
Entertainment Security Operations Center
ESOC announced in CED Magazine
Briefs: Amazon, Fox, Disney, Alticast, Secure Channels Amazon has debuted its Fire TV Stick...
cyber attacks
Hackers Bypass MFA on Cloud Accounts via IMAP Protocol
Over the past several months, threat actors have been increasingly...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure,...
Internal Revenue Service

Internal Revenue Service is Latest to Be Successfully Hacked

By Peter Bernstein Another day, another database of significance compromised. Indeed, if it...

‘National security risks’: New Zealand blocks use of Huawei equipment for 5G network

Published time: 28 Nov, 2018 17:07 Edited time: 29 Nov, 2018 11:01 Get short URL File Photo: ©...

ParaDoxBox and your Business

*Upgrading ParaDoxBox with SCI licensed technologies SUBROSA and PKMS2, creates a data security platform.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or be ill-prepared in protecting every endpoint. Secure Channels’ ParaDoxBox™ Data Security Platform fills these gaps by providing users an intuitive, user-friendly, interface while providing a wide array of encryption options.

ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state.

    • Intuitive, easy-to-use interface
    • Pervasive Encryption
    • Bypass and Social Engineering Attack Protection
    • Protects endpint devices
    • Users choose encryption scope (disk, partition, volume, file, share)

Technology in the News

Six Reasons why Encryption isn’t working — Guardtime

Close to 95% of all enterprise networks have already been compromised by external attackers. Only 3 percent of U.S. organizations felt safe against insider threats. The loss of intellectual property from Fortune 500 firms alone has been described as the largest wealth...

Six Reasons why Encryption isn’t working — Guardtime

Close to 95% of all enterprise networks have already been compromised by external attackers. Only 3 percent of U.S. organizations felt safe against insider threats. The loss of intellectual property from Fortune 500 firms alone has been described as the largest wealth...

Equifax’s Data Breach Costs Hit $1.4 Billion

Credit reporting giant Equifax has spent nearly $1.4 billion on cleanup costs as well as overhauling its information security program following its massive 2017 data breach. Did you enjoy this article? Then read the full version from the author's...

Cybersecurity Trends For 2019 – The Escalating War Against Encryption, Privacy, And Security

By Richard Blech  December 20, 2018 The year 2018 saw the opening salvos of a Cold War. One side of the ongoing conflict is information technology companies, civil libertarians, privacy advocates, and academics. The other side is a multi-government coalition largely...

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using ParaDoxBox Technology

SCI Subsidiaries Using ParaDoxBox Technology

SCI Licensed Upgrades Available

What is ParaDoxBox?

ParaDoxBox™ creates encrypted virtual containers on endpoints, providing protection levels that meet or exceed industry and national standards. It is transparent once deployed, requiring no specialized training. Users select the encryption algorithms and the standards with which to comply (e.g., FIPS 140-2 Annex A).

Secure Channels’ SUBROSA® authentication technology and the PKMS2 Mode of Operation are both optional, licensed components . Even in the event the network is breached, ParaDoxBox™ ensures that your data is safe.

Pervasive Encryption

The ParaDoxBox™ Data Security Platform can be easily deployed to all of an organization’s laptops and workstations (either by download, isolated sandbox environment, or group policy installation). Once installed and registered, it can be used to provide any desired combination of full disk, partition, volume, hidden volume, and file encryption. ParaDoxBox™ goes well-beyond BitLocker-style Full Drive Encryption (FDE).

White Papers & Resources