'; $('#et-footer-nav').append(ssl_seal); }); });
Image-Based 'Passwordless' User Authentication
Contact Us for Effective Security Solutions
Image-Based 'Passwordless' User Authentication
Contact Us for Effective Security Solutions
Image-Based 'Passwordless' User Authentication
Contact Us for Effective Security Solutions

SUBROSA©: Authenticate Users with Images

Five Ways SUBROSA Addresses Cybersecurity Gaps

  1. Intuitive user access experience
  2. More secure alternative to vulnerable passwords
  3. Customizable, brandable image-based login interface
  4. Easy-to-remember image patterns reduce forgotten-password help calls
  5. Security, simplicity and memorability promote excellent “authentication hygiene”

SUBROSA© and your Business

  • Authentication factor and cryptographic key generation tool – more secure than PINS or user-generated passwords
  • Users choose a selection of photos/ images, then choose a customized tile pattern that is personal to them
  • The chosen tile pattern is converted into a 65,000+ character long, randomized, encrypted key as their password
  • SUBROSA© exceeds “Password Best Practices” in being: very long, random, encrypted, difficult to socially engineer

What is SUBROSA©?

  • Users choose their own pictures or digital images then select an easy to remember tile pattern
  • SUBROSA© converts this tile pattern into a very long encrypted password/ log-in (65,000 characters min.)
  • Replaces hard to remember passwords and PINS with easy to remember picture tiles


SUBROSA©, available at SCIFCOM, is an authentication gateway that can be seamlessly integrated into distributed applications for enhanced network security. As a single factor in a multifactor authentication process, or as a standalone password replacement. SUBROSA© mitigates the risks associated with social engineering attacks, such as credential stuffing, dictionary attacks, or phishing.

Hackers are using more advanced techniques to find a backdoor into your organization’s data and text-based passwords are one of the weakest points in network security. While common best practices include the cycling of complex passwords every 30-90 days and preventing re-use of old passwords, this has created a new problem. Users start to use permutations of their previous passwords, simple passwords that are memorable, or even keep a list of their passwords that, if exposed, could put organizational security at significant risk. SUBROSA© addresses these risks by introducing a simple and secure visual password. Users have the option to create their passwords using SUBROSA©’s default imagery or load their own photos which are then presented in a 4x4, 6x6, or 8x8 grid. Once the images have been selected the password is the result of a sequence of grid tiles that a user selects from within any combination of photo imagery.

While the interface is simple, the underlying architecture powering the visual security algorithm is highly sophisticated. SUBROSA© passwords created by selecting only four tiles from memorable images creates a password that’s equivalent to a text password of more than 65,000 characters in length. The strength of SUBROSA©’s password is the result of each pixel within each tile outputting a cryptographically secure hash. In other words, SUBROSA© lets users create a simple and memorable password that’s extremely resistant to modern hacking techniques.

SUBROSA© comes complete with a developer toolkit and sandbox for evaluation prior to deployment.

Secure Channels Solutions Using SUBROSA© Technology

Secure Channels Subsidiaries Using SUBROSA© Technology

In The News

Entertainment Security Operations Center
World’s First Exclusive Entertainment Security Operations Center (ESOC) Launched by SCI
World’s First Exclusive Entertainment Security Operations Center (ESOC) Launched by Secure...
We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened
I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of...
These Are the Worst Corporate Hacks of All Time
As business processes and personal information move online, the number of data hacks is...

North Korea Is Still Trying to Hack US Critical Infrastructure

The ongoing cyber campaign seeks to infiltrate defense, financial, energy, telecom, and...

Secure Channels CEO comments on Ad Injections

The Painful Persistence of Ad Injections Some of those annoying ads that pop up when you visit...

7 Key Elements of a Successful Encryption Strategy

The most common method of protecting data in motion is the use of a secure sockets layer...

Technology in the News

How to Avoid the Top Three Causes of Data Breaches in 2019

What's the price of unprotected IT infrastructure? Cybercrime Magazine says that global damages will surpass $6 billion as soon as 2021. Here we'll go through some of the most frequent and emerging causes of data breaches in 2019 and see how to address them in a...

Google confirms ‘quantum supremacy’ breakthrough

Google has officially announced that it’s achieved quantum supremacy in a new article published in the scientific journal Nature. The announcement comes exactly one month after it initially leaked, when Google’s paper was accidentally published early.Did you enjoy...

NordVPN confirms it was hacked

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached.Did you enjoy this article? Then read the full version from the author's...

We asked a hacker to try and steal a CNN tech reporter’s data. Here’s what happened

I share, therefore I am. I am the kind of person who posts Instagram photos (filtered, of course) from my vacation. I am also the kind of person who tweets about buying an overly-expensive piece of furniture because I fell for a sleek online ad about how it would...

Newsrooms, let’s talk about G Suite

There are many legitimate reasons to give administrators this far-reaching ability to organize and retain user data, such as compliance with legal requests. All of this logging and retention functionality may also help your organization’s administrators monitor for...

In the last 10 months, 140 local governments, police stations and hospitals have been held hostage by ransomware attacks

The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over. CNN's Tina Burnside, Kevin Collier, Pierre Meihan, Faith Karimi, Eli Watkins and Zachary Cohen contributed to this story. Did you enjoy this...

Cloud Breaches Like Capital One Will Strike At Self-Driving Cars

The news has covered yet another breach of systems security that involves the theft of massive amounts of data, in this case impacting an estimated 100 million customers of Capital One Financial Corp. In the past, the public might have reacted vociferously in outright...

Siemens-Poneman Study: Cyber attacks on power utilities are growing in numbers, complexity

The cybersecurity risks against critical power infrastructure seems to be worsening, as a new study indicates that 56 percent of respondents reported their companies suffered one or more shutdowns or loss of operational data per year. Did you enjoy this article? Then...

Hack Breaks PDF Encryption, Opens Content to Attackers

Researchers in Germany have invented a new hack that can allow someone to break the encryption of PDF files and access their content  — or even forge signed PDF files under certain circumstances. Did you enjoy this article? Then read the full version from the author's...

‘Harvesting Attacks’ & the Quantum Revolution

Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now. The Information Age replaced industrial equipment with data. Did you enjoy this article?...