SUBROSA – Simple User Based Resource Oriented Segmentation Architecture SUBROSA is our access authorization and password replacement web service that helps companies eliminate the vulnerabilities associated with password-based authentication. It effectively thwarts brute-force attacks by allowing users to choose unique data resources to generate their keys and establish a personal interaction pattern with the resource.

In The News

Secure Channels
Secure Channels Inc. Expands Leadership Team With CTO/Chief Architect and Government Affairs Liaison
Cybersecurity Innovator Names Industry Veterans to High-Profile Technology and Government...
Toyota Reveals a Second Data Breach
Watch for updates on this developing story. Toyota Motor Corp. has reported its second data...
U.S. government
Nielsen warns US ‘not prepared’ for foreign cyberattacks
Homeland Security Secretary Kirstjen Nielsen on Monday called for the U.S. to take on a “whole...

Cybersecurity Trends For 2019 – The Escalating War Against Encryption, Privacy, And Security

By Richard Blech  December 20, 2018 The year 2018 saw the opening salvos of a Cold War. One...
Sony studios and Amy Pascal

Amy Pascal A Day Late And 47,000 Breaches Short by Richard Blech

Sony studios and Amy Pascal are a perfect example of security as an afterthought. We no longer...

SUBROSA and your Business

  • Authentication factor and cryptographic key generation tool – more secure than PINS or user-generated passwords
  • Users choose a selection of photos/ images, then choose a customized tile pattern that is personal to them
  • The chosen tile pattern is converted into a 65,000+ character long, randomized, encrypted key as their password
  • SUBROSA exceeds “Password Best Practices” in being: very long, random, encrypted, difficult to socially engineer

Use Case - SUBROSA SDK/API

     SUBROSA, available at SCIFCOM, is an authentication gateway that can be seamlessly integrated into distributed applications for enhanced network security. As a single factor in a multifactor authentication process, or as a standalone password replacement. SUBROSA mitigates the risks associated with social engineering attacks, such as credential stuffing, dictionary attacks, or phishing.

WHY SUBROSA:
     Hackers are using more advanced techniques to find a backdoor into your organization’s data and text-based passwords are one of the weakest points in network security. While common best practices include the cycling of complex passwords every 30-90 days and preventing re-use of old passwords, this has created a new problem. Users start to use permutations of their previous passwords, simple passwords that are memorable, or even keep a list of their passwords that, if exposed, could put organizational security at significant risk. SUBROSA addresses these risks by introducing a simple and secure visual password. Users have the option to create their passwords using SUBROSA’s default imagery or load their own photos which are then presented in a 4x4, 6x6, or 8x8 grid. Once the images have been selected the password is the result of a sequence of grid tiles that a user selects from within any combination of photo imagery.

     While the interface is simple, the underlying architecture powering the visual security algorithm is highly sophisticated. SUBROSA passwords created by selecting only four tiles from memorable images creates a password that’s equivalent to a text password of more than 65,000 characters in length. The strength of SUBROSA’s password is the result of each pixel within each tile outputting a cryptographically secure hash. In other words, SUBROSA lets users create a simple and memorable password that’s extremely resistant to modern hacking techniques.

     SUBROSA comes complete with a developer toolkit and sandbox for evaluation prior to deployment.

Technology in the News

Six Reasons why Encryption isn’t working — Guardtime

Close to 95% of all enterprise networks have already been compromised by external attackers. Only 3 percent of U.S. organizations felt safe against insider threats. The loss of intellectual property from Fortune 500 firms alone has been described as the largest wealth...

Six Reasons why Encryption isn’t working — Guardtime

Close to 95% of all enterprise networks have already been compromised by external attackers. Only 3 percent of U.S. organizations felt safe against insider threats. The loss of intellectual property from Fortune 500 firms alone has been described as the largest wealth...

Equifax’s Data Breach Costs Hit $1.4 Billion

Credit reporting giant Equifax has spent nearly $1.4 billion on cleanup costs as well as overhauling its information security program following its massive 2017 data breach. Did you enjoy this article? Then read the full version from the author's...

Cybersecurity Trends For 2019 – The Escalating War Against Encryption, Privacy, And Security

By Richard Blech  December 20, 2018 The year 2018 saw the opening salvos of a Cold War. One side of the ongoing conflict is information technology companies, civil libertarians, privacy advocates, and academics. The other side is a multi-government coalition largely...

Is Your Encryption Flexible Enough? – Cyber Defense Magazine

The science of modern cryptography utilizes mathematics as the basis for transforming information into an encoded secret that cannot be decoded or translated without the correct key. Did you enjoy this article? Then read the full version from the author's...

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ Featuring XOTIC

Secure Channels Launches Desktop Encryption Utility ZIPcrypt™ featuring XOTIC™ extreme encryption technology and all-new “dialable” cipher-strength UNITED STATES, April 18, 2019 /EINPresswire.com/ -- IRVINE, CALIF. (April 17, 2019) – Secure Channels Inc. Did you enjoy...

HTTPS Isn’t Always as Secure as It Seems

Widespread adoption of the web encryption scheme HTTPS has added a lot of green padlocks—and corresponding data protection—to the web. Did you enjoy this article? Then read the full version from the author's...

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. Did you enjoy this article? Then read the full version from the author's...

Toyota Reveals a Second Data Breach

Watch for updates on this developing story. Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers. Did you enjoy this article? Then read the full...

UCLA will pay $7.5 million in claims, cyber enhancements to settle 2015 breach

'); })(); //--> Skip to main content By Topics: Compliance & Legal, Network Infrastructure, Privacy & Security Did you enjoy this article? Then read the full version from the author's...

SCI Solutions Using SUBROSA Technology

SCI Subsidiaries Using SUBROSA Technology

What is SUBROSA?

  • Users choose their own pictures or digital images then select an easy to remember tile pattern
  • SUBROSA converts this tile pattern into a very long encrypted password/ log-in (65,000 characters min.)
  • Replaces hard to remember passwords and PINS with easy to remember picture tiles