Secure Channels partners with Access Smart

Power LogOn + ParaDoxBox secures a company’s most important data: User Credentials and Sensitive Data Files using Endpoint Encryption Platform functionality to enhance the capabilities of the Power LogOn® software. ParaDoxBox™ for Power LogOn® provides a seamless endpoint encryption experience for endusers while providing robust functionality for administrators.

In The News

Malware
1,000 Businesses Hit By POS Malware (Again) by Richard Blech
And the beat goes on bada bing, bada boom! Data Breach Today is reporting:...
620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts
Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale...
cell phone
Discovered Flaw leaves Back Door with Cell Phone Calls
Recently The Washington Post printed an article written By Craig Timberg “German researchers...

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale...
Skills shortage

The Risks And Far-Reaching Impacts Of The Cybersecurity Skills Shortage

The Risks And Far-Reaching Impacts Of The Cybersecurity Skills Shortage By Richard...
access smart

Secure Channels and Access Smart Partner to Create an End-to-End Solution for Data Security

IRVINE, Calif., Dec. 12, 2017 /PRNewswire/ -- Secure Channels Inc., provider of innovative...

Paradox Box/Power Logon and your Business.

It’s estimated that 96% of data stolen in enterprise breaches was unencrypted, and therefore exposed to malicious actors. In many cases, the failure to protect sensitive data was due to the difficulty involved in deploying encryption within an enterprise environment or simply not protecting every endpoint. Secure Channels’ ParaDoxBox™ fills these gaps by providing administrators an intuitive, user-friendly, comprehensive management interface while providing a wide array of encryption options and enterprise management functionality.

  • Intuitive, easy-to-use interface
  • Securely protects volumes on endpoints
  • Administrators securely designate encryption scope (volume, Cloud location), encryption strength, encryption algorithm, and key hashing algorithm

Technology in the News

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

Quantum computing will break your encryption in a few years

Quantum computers – those that use the principles of quantum entanglement and superposition to represent information, instead of electrical bits – are capable of performing certain types of calculation orders of magnitude more quickly than classical, electronic...

Nielsen warns US ‘not prepared’ for foreign cyberattacks

Homeland Security Secretary Kirstjen Nielsen on Monday called for the U.S. to take on a “whole of society” approach to combat cyber threats, saying the U.S. “is not prepared” to handle hackers backed by other countries. “It’s not just U.S. Did you enjoy this article?...

These Are the Worst Corporate Hacks of All Time

As business processes and personal information move online, the number of data hacks is growing. Some are minor and go undetected, while others are so major that they can put an entire company at risk. Hacks ranged from a few million records exposed to several...

North Korea Is Still Trying to Hack US Critical Infrastructure

The ongoing cyber campaign seeks to infiltrate defense, financial, energy, telecom, and healthcare firms. Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using Power LogOn – ParaDoxBox Technology

What is Power Logon – ParaDoxBox?

Ease of Use
When the Power LogOn MFA smartcard is inserted the reader, the encrypted storage becomes visible and accessible. Behind the scenes, the Power LogOn® software is authenticating the user-to-the-card, the card-to-the-endpoint, and the endpoint-to-the-server.

Ease of Encryption
ParaDoxBox™ uses On-The-Fly-Encryption (OTFE) to encrypt and protect data on endpoints. OTFE ensures that data is never persistently stored in an unencrypted state. OTFE incorporates multiple symmetric ciphers options, enhanced authentication technology, and enterprise controls. ParaDoxBox™ offers enhanced security to Power LogOn® that flexibly supports various data encryption requirements.

Social Engineering Attack Protection
ParaDoxBox™ For Power LogOn® supports knowledge and possession authentication credentials to provide the desired level of authentication assurance. Social engineering attacks are eliminated through the use of the MFA Smartcard and card reader technology. Administrators control the access credentials from the endpoint-to-the-server thus ensuring endusers can’t ever knowingly or unknowingly share access credentials.

Pervasive Encryption
ParaDoxBox™ can be easily deployed to all Window’s-based laptops and workstations (either by download or in an isolated sandbox environment). Once installed and registered, encrypted volumes can be created at the administrator’s discretion. ParaDoxBox’s administrative functionality guarantees that the Power LogOn® administrator retains complete, secure control of encryption keys, ensuring data access.