Secure Channels partners with Access Smart

Power LogOn + ParaDoxBox secures a company’s most important data: User Credentials and Sensitive Data Files using Endpoint Encryption Platform functionality to enhance the capabilities of the Power LogOn® software. ParaDoxBox™ for Power LogOn® provides a seamless endpoint encryption experience for endusers while providing robust functionality for administrators.

In The News

Cyber attacks
Four million records exposed in second US agency hack in a year
Breach of four million records at US federal personal agency could be used for secondary...
Doh! What My Encrypted Drive Can Be Unlocked By Anyone?
When a password of “” can open up your encrypted drive Prof Bill Buchanan OBE Nov 5, 2018....

Suspected State-Sponsored Hackers Pummel US and Australia

Dozens of companies in the U.S. and political parties in Australia have been targeted in...

CEO Richard Blech On Wearable Security

Researcher Claims Your Wearable Fitness Trackers Can Be Hacked Over 72 million tracker devices...
Secure Channels

Secure Channels Inc. Expands Leadership Team With CTO/Chief Architect and Government Affairs Liaison

Cybersecurity Innovator Names Industry Veterans to High-Profile Technology and Government...

Paradox Box/Power Logon and your Business.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or simply not protecting every endpoint. Secure Channels’ ParaDoxBox™ fills these gaps by providing administrators an intuitive, user-friendly, comprehensive management interface while providing a wide array of encryption options and enterprise management functionality.

  • Intuitive, easy-to-use interface
  • Securely protects volumes on endpoints
  • Administrators securely designate encryption scope (volume, Cloud location), encryption strength, encryption algorithm, and key hashing algorithm

Technology in the News

Suspected State-Sponsored Hackers Pummel US and Australia

Dozens of companies in the U.S. and political parties in Australia have been targeted in recent attacks that appear to have state sponsorship. Did you enjoy this article? Then read the full version from the author's...

Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies

SAN FRANCISCO — Businesses and government agencies in the United States have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts believe have been energized by President Trump’s withdrawal from the Iran nuclear deal la Did you enjoy...

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

All these numbers…. Now, a new set of databases containing millions of hacked accounts from several websites has been made available for sale on the dark web marketplace by the same hacker who goes by online alias Gnosticplayers. Did you enjoy this article? Then read...

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale from today on the dark web, according the data trove's seller. Did you enjoy this article? Then read the full version from the author's...

Cybercriminals Exploit Gmail Feature to Scale Up Attacks

Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple fraudulent accounts on websites, using variations of the same email address, Agari says. Did you enjoy this article? Then read the full version from the author's...

191 Million US Voter Registration Records Leaked In Mystery Database

A whitehat hacker has uncovered a database sitting on the Web containing various pieces of personal information related to 191 million American citizens registered to vote. Did you enjoy this article? Then read the full version from the author's...

Cloud Customers Faced 681M Cyberattacks in 2018

The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices. Cloud customers were hit with 681 million cyberattacks last year, according to analysts at cloud security provider Armor, which recently analyzed cloud...

7 Key Elements of a Successful Encryption Strategy

The most common method of protecting data in motion is the use of a secure sockets layer virtual private network (SSL VPN). Technologies such as SSL VPN are critical in the effort to protect against man-in-the-middle attacks and packet sniffers. Did you enjoy this...

Data breach attack surfaces to expand in 2019

When it comes the gauging the newsworthiness of a story, there’s an old adage in journalism that reporters should ask themselves whether or not the story is of the “dog bites man” or “man bites dog” variety. Did you enjoy this article? Then read the full version from...

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1" is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique...

SCI Solutions Using Power LogOn – ParaDoxBox Technology

What is Power Logon – ParaDoxBox?

Ease of Use
When the Power LogOn MFA smartcard is inserted the reader, the encrypted storage becomes visible and accessible. Behind the scenes, the Power LogOn® software is authenticating the user-to-the-card, the card-to-the-endpoint, and the endpoint-to-the-server.

Ease of Encryption
ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state. OTFE incorporates multiple symmetric ciphers options, enhanced authentication technology, and enterprise controls. ParaDoxBox™ offers enhanced security to Power LogOn® that flexibly supports various data encryption requirements.

Social Engineering Attack Protection
ParaDoxBox™ For Power LogOn® supports knowledge and possession authentication credentials to provide the desired level of authentication assurance. Social engineering attacks are eliminated through the use of the MFA Smartcard and card reader technology. Administrators control the access credentials from the endpoint-to-the-server thus ensuring endusers can’t ever knowingly or unknowingly share access credentials.

Pervasive Encryption
ParaDoxBox™ can be easily deployed to all Window’s-based laptops and workstations (either by download or in an isolated sandbox environment). Once installed and registered, encrypted volumes can be created at the administrator’s discretion. ParaDoxBox’s administrative functionality guarantees that the Power LogOn® administrator retains complete, secure control of encryption keys, ensuring data access.