Secure Channels partners with Access Smart

Power LogOn + ParaDoxBox secures a company’s most important data: User Credentials and Sensitive Data Files using Endpoint Encryption Platform functionality to enhance the capabilities of the Power LogOn® software. ParaDoxBox™ for Power LogOn® provides a seamless endpoint encryption experience for endusers while providing robust functionality for administrators.

In The News

Data Breach
Ransomware Becomes Mainstream by Richard Blech
Hackers have cleverly designed a method of attack to distribute CTB-Locker or Critroni crypto...
Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity
The cybersecurity risks against critical power infrastructure seems to be worsening, as a new...
Secure Channels
The Dichotomy of a Hacker
Now more than ever, it is important to implement a robust, state of the art cyber security...

Accidental data breaches are often compounded by a failure to encrypt

83 percent of security professionals believe that employees have accidentally exposed customer...

It Only Took 9 Seconds to Guess a DOD Weapons System Password

The first step in solving any problem is admitting there is one. But a new report from the US...
Secure Channels

Secure Channels Inc. Disrupts Technology With It’s PATENT

An Interview With Richard Blech and Robert Coleridge By Deirdre Murphy Technology - the...

Paradox Box/Power Logon and your Business.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or simply not protecting every endpoint. Secure Channels’ ParaDoxBox™ fills these gaps by providing administrators an intuitive, user-friendly, comprehensive management interface while providing a wide array of encryption options and enterprise management functionality.

  • Intuitive, easy-to-use interface
  • Securely protects volumes on endpoints
  • Administrators securely designate encryption scope (volume, Cloud location), encryption strength, encryption algorithm, and key hashing algorithm

Technology in the News

ZIPcrypt Review: A Revolutionary Encryption Tool

By SoftwareSugges We’re living in a hyper-digital era and never before has cryptography attained such massive importance in our lives. Organizations all over the globe have realized the value of encryption tools to ensure that their data is protected in transit and...

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using Power LogOn – ParaDoxBox Technology

What is Power Logon – ParaDoxBox?

Ease of Use
When the Power LogOn MFA smartcard is inserted the reader, the encrypted storage becomes visible and accessible. Behind the scenes, the Power LogOn® software is authenticating the user-to-the-card, the card-to-the-endpoint, and the endpoint-to-the-server.

Ease of Encryption
ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state. OTFE incorporates multiple symmetric ciphers options, enhanced authentication technology, and enterprise controls. ParaDoxBox™ offers enhanced security to Power LogOn® that flexibly supports various data encryption requirements.

Social Engineering Attack Protection
ParaDoxBox™ For Power LogOn® supports knowledge and possession authentication credentials to provide the desired level of authentication assurance. Social engineering attacks are eliminated through the use of the MFA Smartcard and card reader technology. Administrators control the access credentials from the endpoint-to-the-server thus ensuring endusers can’t ever knowingly or unknowingly share access credentials.

Pervasive Encryption
ParaDoxBox™ can be easily deployed to all Window’s-based laptops and workstations (either by download or in an isolated sandbox environment). Once installed and registered, encrypted volumes can be created at the administrator’s discretion. ParaDoxBox’s administrative functionality guarantees that the Power LogOn® administrator retains complete, secure control of encryption keys, ensuring data access.