SlideShare a Scribd company logo
Unmatched Security for the Digital Ecosystem
Data breaches are the increasing threat
Identity Theft Resource Center
2014 Breach List: Breaches: 480 Exposed: 17,508,452
Report Date: 8/19/2014
Source: http://www.idtheftcenter.org/
“Is the data worth protecting? Then how can
it be done?”
Secure Channels Patented Encryption will just do that.
Secure Channels patented encryption works even if a private
cloud is hacked. The only thing a hacker can see is useless
bits and bytes without a number of details:
- the entire set of encryption keys used
- the relevant pattern keys
- the encryption scripts
- relevant source code algorithms.
All this is seamlessly used to encrypt the data and without it
the hacker is lost.
Secure Channels Inc
TECHNOLOGY
PKMS2
Pattern Key Multi Segment, Multi Standard
• The flexibility to use 3rd party libraries means the process is extensible to any future
development in encryption patterns.
• Can be deployed to private datacenter’s or public clouds such as Amazon’s AWS.
• Is applicable to secure transmission and secure storage of data including mobile devices.
• Solves the inherent difficulties with encryption of single key use or protocol to encrypt
data by breaking a file into segments and encrypting each segment individually.
• The protocols/passwords used are based on a pattern key and can be as simple or as
complex as necessary. This pattern is user-derived and thus can be as unique as the user
wants.
• Patented technology that can also use available FIPS certified 3rd party encryption
libraries in a new and innovative way to produce “unbreakable” communications and
data files. The technology is entitled PKMS2 for “Pattern Key Multi Segment, Multi
Standard”.
Secure Channels Inc Patented Technology
PKMS2
Secure Channels Inc Patent Technology
PKMS2
Baked Shrimp
Melt a stick of butter in the
pan. Slice one lemon and layer
it on top of the butter. Put
down fresh shrimp, then
sprinkle one pack of dried
Italian seasoning. Put in the
oven and bake at 350 for 15
min. Best Shrimp you will EVER
taste:)
Ordinary Document
Apply initial
encryption pattern
with key 5 (yellow)
Initial optional encryption
Change angle to see layers
Segment 1 with Process 1
Encrypt
segment
#1 with
key 2 (red)
Encrypt
segment #3
with key 8 (blue)
Segment 3 with Process 3
Encrypt
segment #4
with key 7 (purple)
Segment 4 with Process 4
Encrypt
segment #5
with key 2 (red)
Segment 5 with Process 1
Encrypt
segment #6
with key 6
(green)
Segment 6 with Process 2
Encrypt
segment #7
with key 8 (blue)
Segment 7 with Process 3
Encrypt
segment #2
with key 6
(green)
Segment 2 with Process 2
Apply
optional
final
encryption
with key 4
PKMS2
applied – for
all practical
purposes, the
document is
immune to
hacker
decryption
Final Optional Encryption
Encrypt
segment #8
with key 7
(purple)
Segment 8 with Process 4
Secure Channels Inc
TECHNOLOGY
SPHERE
Secure Channels Process Hardened Encryption &
Resource Envelopment
• SPHERE is our technology that combines the following into a cohesive process
• current encryption standards (e.g. AES256)
• our own patented protocols (e.g. PKMS2)
• our own mathematical encryption models (over 350 patterns)
• an encryption oriented scripting language
• optional customer encryption processes
By doing this we have achieved an unbreakable encryption standard that is unparalleled in the industry. By
crafting scripts that start where most cybersecurity tools finish (i.e. FIPS compliance) we can provide the
minimal security of FIPS compliance to our maximal security of an impenetrable nature.
By allowing our customers to inject their own encryption standards into our process pipeline we can assure
them that their data is theirs alone. We at SecureChannels feel very strongly that (given legal usage) the
customer’s data belongs to the customer alone. As such, not only do we not mine the data, we can’t mine the
data.
To ensure this level and confidence of data security we enable encryption from endpoint to endpoint, covering
data storage through transmission.
Secure Channels Inc Patented Technology
SPHERE
Secure Channels Inc
TECHNOLOGY
Language Agnostic Communications
• Text based communication (IM, SMS, chat, email, etc.) can be language
agnostic*
• Sender creates message in sender’s native language
• Recipient receives message in recipient’s native language
• Communicated message can be standalone or contain original message
• Translation practices can also be applied to stored or transmitted
documents
* - based on currently available language translation tools
Secure Channels Inc
Language Agnostic Communications
Secure Channels Inc
Solutions
Shield of Certainty Cloud Services™
Secure Channels Inc
Solutions
Shield of Certainty Cloud Services™
Shield of Certainty Cloud Services™ provides
multiple layers of protection from the physical data
center all the way through to the database. Security
is the core of Secure Channels infrastructure.
Secure Cloud Encrypted File protection services:
• Files ( Documents, Pictures, Videos)
• Backup (Database, Financials, and Documents)
Secure Channels Inc
Solutions
Data Encryption Solutions
PKMS2 Patented Encryption Technology
We can protect your data in house and in the
cloud:
• File servers
• Disaster recovery data
• Backups
Whether your data is on cloud service or on local
servers we can encrypt your data with our patented
encryption technology.
Secure Channels Inc
Vertical Market Rollout
Financial Sector
Banking
Point of Sale
Investments
Healthcare
Health Records
EMR Integration
Hospitals
Cloud Services
Datacenters
File Hosting
Business Hosting
Information
Technology
End Point Protection
Hardware, Software
Disaster Recovery
• Secure Channels SA is exclusively licensed in the US to use its brand. This company is Secure Channels Inc
with its main offices in Irvine, California.
• PLEASE NOTE: Secure Channels Inc is currently NOT a subsidiary of Secure Channels SA and has independent
ownership.
• Secure Channels SA is a Swiss corporation whose primary function is to own and develop IP to licensed
distributors to sell.
• The Company’s current valuation is $25,000,000
Secure Channels Inc Technology
CORPORATE STRUCTURE
• In the mobile telephony voice space there are
a number of competitors such as:
• Silent Circle
CellCrypt
Crytophone
PhoneCrypt
Secure Voice
SecSmart
SnapCell
TopSec
Secure Mobile
Airwatch
• Mobile is not our focus even though we could
compete due to having superior technology.
Secure Channels Inc Technology
OUR COMPETITION
• In the data transfer and cloud storage market
there are fewer competitors and in fact some
of these could become clients or partners
rather than competitors:
• Dropbox
Mega
Skydrive
Google
Yahoo
CloudGateway
Zenprise
• Both our language agnostic and PKMS2 technologies can enhance the services of a number
of our competitors as plug-ins or applications. Whilst we will be providing our technologies
through our partners, we see a huge market for them in licensing our technologies to other
service providers. We can also see ourselves consequently becoming an acquisition target of
some of these competitors.
• Whilst intrusion detectors, firewalls, etc. provide a deterrence, the real key to protecting IP
and valuable data is the encryption behind those defences. When a hacker breaks in, all they
find is un-readable data.
• PKMS2 takes existing data, whether encrypted or not, and breaks it into segments,
encrypting each segment with separate keys. The sequence of the segments varies with
time. Therefore unless the hacker has all of those keys, plus the sequence at any given
moment of time, it is impossible to break. This technology is exclusive to PKMS2.
Secure Channels Inc Technology
OUR COMPETITION Could become clients
• Start in North America through Proximity LLC and Secure Channels Inc with our focus on partnering with other technology
providers to provide a holistic solution.
• Focus on securing the cloud applications.
• Once the North America market has been established, we will license other distributors and partners in other territories.
To this end, Secure Channels SA has entered into a global agreement with the International Telecommunications Union’s
IMPACT group, through which it is being introduced to more than 140 countries see: http://impact-
alliance.org/countries/alphabetical-list.html Other corporate members of IMPACT include HP, IBM, Microsoft, Intel and
Cisco as examples.
• Undertake discussions with the IT major players such as Microsoft, Google, HP, Cisco, AWS and Intel (already having early
discussions with Cisco and HP), primarily as potential customers and distributors.
• Key Offerings:
• High-end data encryption for businesses, government agencies, non-profits and High Net Worth individuals.
• Data protection in the cloud, at rest, and in transit.
• Pivot products and solutions to address Mobile and Bring-Your-Own-Device (BYOD) implications, as well as Language
Translation capabilities.
Secure Channels Inc Technology
WHY WE ARE THE BEST
Richard Blech: CEO Secure Channels Inc - is an entrepreneur, investor and innovator. His primary business focus is on data security and technology and he is interested
in sustainability. As managing member of Imperium Management LLC, Richard actively invests in technologically advanced and ecologically friendly ventures. He has a
discerning ability to determine market trends that are not only lucrative, but also pave the way to technological advancement across the globe. Richard is the President
of Secure Channels Inc. and the CEO of Proximity LLC - both high tech/data security companies.
Malcolm Hutchinson: CEO Secure Channels SA - is a highly experienced Australian Executive and entrepreneur residing in Switzerland with extensive experience in
both the public and private sectors. He was an executive at CEO level (10 years) in Australian local government, worked on United Nations IT projects for 4 years then
became an entrepreneur. He co-founded two successful start-ups in Switzerland including Living PlanIT SA and WISeKey SA. Malcolm is renowned as a business
strategist having in particular developed the business concepts for WISeKey (current valuation in excess of $200 million) and Living PlanIT (current valuation in excess
of $1 billion). He was named as one of the IT industry’s “Movers and Shakers” by IT Watch USA in 2001.
Robert Coleridge: CTO Secure Channels Inc & SA- is long time Systems Analyst/Software Engineer with over 35 years' experience, 12 of those at Microsoft as a Senior
Software Design Engineer. At Microsoft he spent the majority of his time in the areas of creating and building strategic and visionary working prototypes for a number
of the executives including Gates and Ballmer. While at Microsoft Robert also had the opportunity to play key roles in the development and vision that was to become
.NET and WCF. He designed and implemented Microsoft's first SOAP toolkit which today is better known as web services. Today more than 6 billion devices including
every smart phone relies on the software Robert helped create.
Mike Vallejo: CIO- -Secure Channels Inc - is an innovator in the technology industry for over 20 years. His vast experience has involved managing, maintaining, and
directing the scope of information for business. Including user support, maintenance of network/server/database/application infrastructure, security policy, application
software support and development, IT controllership and technology integrations. He has developed software for B2B, the health care industry as well as the security
field. Mike’s specialty is program budget management, technology operations, engineering and business relationship partnering to align information technology with
the strategic direction of the company.
Secure Channels Inc Technology
Management
TRN : Secure web hosting, Encrypted Document Management, Video Streaming services, Disaster Relief programs
Kaspersky: Appliance integration, Endpoint Protection with encryption
XAC Automation and Zakus: Encryption on POS devices
Ciphertex: Encryption of their NAS and Backup devices
Video Surveillance Now: Encryption of video in the Video Security sector
South Coast Plaza: Secure Cloud Services, Encryption of Analytic data from Proximity
Backpac: Cloud services, Encryption, Proximity, Language Agnostic Communications
Invincea: Integration of their End point protection with encryption for data and OS protection
Gold Fax: Encryption integration of the fax servers on Gold fax software.
Secure Channels Inc Technology
Clients
Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014
http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html
Black Hat Hackers Fail to Crack Encryption Tech
http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech
‘Impenetrable’ encryption arrives to lock down Internet of Things | Third Certainty
http://thirdcertainty.com/breaking-news/impenetrable-encryption-arrives-to-lock-down-internet-of-things/
Secure Channels Inc Technology
Press Release
Proximity LLC
Proximity LLC
Product Technology
Proximity LLC
Software Technology
Secure
Channels
Encryption
Proximity Shop
Store
Products Coupons
Push
Ads Alerts
Proximity LLC
Technology
Proximity Shop
Wireframe
Proximity LLC
Technology
Wireframe
 Splash Page – design is to be determined by client, but with
reference to our branding logo image.
 Featured Page – featured product page. Displays all
featured products from all stores.
 Categories Page – categories page which is named or titled
after the client.
 Stores Page – view the listings of all Church's in range of the
proximity.
 Profile Page – profile page for customer or registered user.
 Search Page – search functionality for stores, products,
specials, etc.
Proximity LLC
Technology
Wireframe
 Product Page – individual product page.
 Coupon Page – displays QR code for redemption to stores.
 Buy Now Page.
Proximity LLC
Management
 Richard Blech – CEO
As CEO of Proximity LLC, a company directly partnered with Secure Channels Inc for which its products enhance the
performance of a wide spectrum of enterprises, addressing such issues as securing accurate demographic data,
management of internet commerce, fraud detection and IP location technology. Blech has taken a hands-on approach at
the various companies that he is affiliated with, often using his financial expertise to oversee the financial aspects of these
businesses. His research and insight has led to cost-effective, energy efficient improvements as major value added
enhancements to his technological partners.
 Ray Rainier – CTO
Ray is a technology professional who has worked for Microsoft Corporation as an Enterprise Consultant. At Microsoft, he
was assigned in the Midwest region to provide consulting services to Fortune 100 companies. An experienced team
leader and collaborator, Ray worked with teams at Accenture, Dell, HP and Intel on various enterprise projects.
 Miguel Carlos – COO
Miguel is a driven entrepreneur with a strong command and expertise of business development and client management
experience. Miguel is a high performing, strategic thinking leader – his skillset lending itself to client relations and
business partnering. Miguel believes presentational and interpersonal communication is the cornerstone for building
businesses in today’s impersonal technological markets. Fostering new companies, by assessing needs, generating
options, and implementing solutions in collaboration with clients and stakeholders. Comfortable from nurturing the original
idea to requirements gathering and needs identification phase through to completion and management of the
company. Miguel is instrumental in building synergy and bringing the team to form a technology company geared for the
future. Miguel is a co-founder of Proximity LLC.
 Mike Vallejo – CIO
Mike is an innovator in the technology industry for over 20 years. His vast experience has involved managing,
maintaining, and directing the scope of information for business. Including user support, maintenance of
network/server/database/application infrastructure, security policy, application software support and development, IT
controllership and technology integrations. He has developed software for B2B, the health care industry as well as the
security field. Mike’s specialty is program budget management, technology operations, engineering and business
relationship partnering to align information technology with the strategic direction of the company.
Proximity LLC
Vertical Market Rollout
Airports
Shopping
Travelers
Parking
Retail
Point of Sale
Shopping Analytics
Trends
Entertainment
Stadiums
Concerts
Sports
M Commerce
Online Shopping
Advertising

More Related Content

What's hot

Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
David Rogers
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
cshergi
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Frank Lesniak
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TWD Industries AG
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubDataWorks Summit
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochure
Colin Valencia
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
TWD Industries AG
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
CipherCloud
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last standGeorge Delikouras
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
DigiCert, Inc.
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTrustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable Security
TWD Industries AG
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
Leonardo De Moura Rocha Lima
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
mdhar123
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
kieranjacobsen
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
CipherCloud
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
Novosco
 

What's hot (20)

Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
SecurEntry by PrehKeyTec
SecurEntry by PrehKeyTecSecurEntry by PrehKeyTec
SecurEntry by PrehKeyTec
 
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2Implementing a Secure and Effective PKI on Windows Server 2012 R2
Implementing a Secure and Effective PKI on Windows Server 2012 R2
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochure
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Global-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data HavenGlobal-WAN - The Swiss Neutral Data Haven
Global-WAN - The Swiss Neutral Data Haven
 
CipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: Encryption
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTrustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable Security
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 
Iritech Inc.
Iritech Inc.Iritech Inc.
Iritech Inc.
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 

Similar to Secure channels main deck

CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
Andris Soroka
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
Echoworx
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
hendrik441443
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
Defence and Security Accelerator
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
TomParker
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
Tony Pearson
 
Top SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your BusinessTop SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your Business
ClickSSL
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
Rebecca Jones
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
Tony Pearson
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
Smart Defend UK
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
GlobalSign
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 

Similar to Secure channels main deck (20)

CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
Top SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your BusinessTop SSL Certificate Providers for Your Business
Top SSL Certificate Providers for Your Business
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
secureMFP
secureMFPsecureMFP
secureMFP
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Secure channels main deck

  • 1. Unmatched Security for the Digital Ecosystem
  • 2. Data breaches are the increasing threat Identity Theft Resource Center 2014 Breach List: Breaches: 480 Exposed: 17,508,452 Report Date: 8/19/2014 Source: http://www.idtheftcenter.org/
  • 3. “Is the data worth protecting? Then how can it be done?” Secure Channels Patented Encryption will just do that. Secure Channels patented encryption works even if a private cloud is hacked. The only thing a hacker can see is useless bits and bytes without a number of details: - the entire set of encryption keys used - the relevant pattern keys - the encryption scripts - relevant source code algorithms. All this is seamlessly used to encrypt the data and without it the hacker is lost.
  • 4. Secure Channels Inc TECHNOLOGY PKMS2 Pattern Key Multi Segment, Multi Standard
  • 5. • The flexibility to use 3rd party libraries means the process is extensible to any future development in encryption patterns. • Can be deployed to private datacenter’s or public clouds such as Amazon’s AWS. • Is applicable to secure transmission and secure storage of data including mobile devices. • Solves the inherent difficulties with encryption of single key use or protocol to encrypt data by breaking a file into segments and encrypting each segment individually. • The protocols/passwords used are based on a pattern key and can be as simple or as complex as necessary. This pattern is user-derived and thus can be as unique as the user wants. • Patented technology that can also use available FIPS certified 3rd party encryption libraries in a new and innovative way to produce “unbreakable” communications and data files. The technology is entitled PKMS2 for “Pattern Key Multi Segment, Multi Standard”. Secure Channels Inc Patented Technology PKMS2
  • 6. Secure Channels Inc Patent Technology PKMS2 Baked Shrimp Melt a stick of butter in the pan. Slice one lemon and layer it on top of the butter. Put down fresh shrimp, then sprinkle one pack of dried Italian seasoning. Put in the oven and bake at 350 for 15 min. Best Shrimp you will EVER taste:) Ordinary Document Apply initial encryption pattern with key 5 (yellow) Initial optional encryption Change angle to see layers Segment 1 with Process 1 Encrypt segment #1 with key 2 (red) Encrypt segment #3 with key 8 (blue) Segment 3 with Process 3 Encrypt segment #4 with key 7 (purple) Segment 4 with Process 4 Encrypt segment #5 with key 2 (red) Segment 5 with Process 1 Encrypt segment #6 with key 6 (green) Segment 6 with Process 2 Encrypt segment #7 with key 8 (blue) Segment 7 with Process 3 Encrypt segment #2 with key 6 (green) Segment 2 with Process 2 Apply optional final encryption with key 4 PKMS2 applied – for all practical purposes, the document is immune to hacker decryption Final Optional Encryption Encrypt segment #8 with key 7 (purple) Segment 8 with Process 4
  • 7. Secure Channels Inc TECHNOLOGY SPHERE Secure Channels Process Hardened Encryption & Resource Envelopment
  • 8. • SPHERE is our technology that combines the following into a cohesive process • current encryption standards (e.g. AES256) • our own patented protocols (e.g. PKMS2) • our own mathematical encryption models (over 350 patterns) • an encryption oriented scripting language • optional customer encryption processes By doing this we have achieved an unbreakable encryption standard that is unparalleled in the industry. By crafting scripts that start where most cybersecurity tools finish (i.e. FIPS compliance) we can provide the minimal security of FIPS compliance to our maximal security of an impenetrable nature. By allowing our customers to inject their own encryption standards into our process pipeline we can assure them that their data is theirs alone. We at SecureChannels feel very strongly that (given legal usage) the customer’s data belongs to the customer alone. As such, not only do we not mine the data, we can’t mine the data. To ensure this level and confidence of data security we enable encryption from endpoint to endpoint, covering data storage through transmission. Secure Channels Inc Patented Technology SPHERE
  • 9. Secure Channels Inc TECHNOLOGY Language Agnostic Communications
  • 10. • Text based communication (IM, SMS, chat, email, etc.) can be language agnostic* • Sender creates message in sender’s native language • Recipient receives message in recipient’s native language • Communicated message can be standalone or contain original message • Translation practices can also be applied to stored or transmitted documents * - based on currently available language translation tools Secure Channels Inc Language Agnostic Communications
  • 11. Secure Channels Inc Solutions Shield of Certainty Cloud Services™
  • 12. Secure Channels Inc Solutions Shield of Certainty Cloud Services™ Shield of Certainty Cloud Services™ provides multiple layers of protection from the physical data center all the way through to the database. Security is the core of Secure Channels infrastructure. Secure Cloud Encrypted File protection services: • Files ( Documents, Pictures, Videos) • Backup (Database, Financials, and Documents)
  • 13. Secure Channels Inc Solutions Data Encryption Solutions PKMS2 Patented Encryption Technology We can protect your data in house and in the cloud: • File servers • Disaster recovery data • Backups Whether your data is on cloud service or on local servers we can encrypt your data with our patented encryption technology.
  • 14. Secure Channels Inc Vertical Market Rollout Financial Sector Banking Point of Sale Investments Healthcare Health Records EMR Integration Hospitals Cloud Services Datacenters File Hosting Business Hosting Information Technology End Point Protection Hardware, Software Disaster Recovery
  • 15. • Secure Channels SA is exclusively licensed in the US to use its brand. This company is Secure Channels Inc with its main offices in Irvine, California. • PLEASE NOTE: Secure Channels Inc is currently NOT a subsidiary of Secure Channels SA and has independent ownership. • Secure Channels SA is a Swiss corporation whose primary function is to own and develop IP to licensed distributors to sell. • The Company’s current valuation is $25,000,000 Secure Channels Inc Technology CORPORATE STRUCTURE
  • 16. • In the mobile telephony voice space there are a number of competitors such as: • Silent Circle CellCrypt Crytophone PhoneCrypt Secure Voice SecSmart SnapCell TopSec Secure Mobile Airwatch • Mobile is not our focus even though we could compete due to having superior technology. Secure Channels Inc Technology OUR COMPETITION • In the data transfer and cloud storage market there are fewer competitors and in fact some of these could become clients or partners rather than competitors: • Dropbox Mega Skydrive Google Yahoo CloudGateway Zenprise
  • 17. • Both our language agnostic and PKMS2 technologies can enhance the services of a number of our competitors as plug-ins or applications. Whilst we will be providing our technologies through our partners, we see a huge market for them in licensing our technologies to other service providers. We can also see ourselves consequently becoming an acquisition target of some of these competitors. • Whilst intrusion detectors, firewalls, etc. provide a deterrence, the real key to protecting IP and valuable data is the encryption behind those defences. When a hacker breaks in, all they find is un-readable data. • PKMS2 takes existing data, whether encrypted or not, and breaks it into segments, encrypting each segment with separate keys. The sequence of the segments varies with time. Therefore unless the hacker has all of those keys, plus the sequence at any given moment of time, it is impossible to break. This technology is exclusive to PKMS2. Secure Channels Inc Technology OUR COMPETITION Could become clients
  • 18. • Start in North America through Proximity LLC and Secure Channels Inc with our focus on partnering with other technology providers to provide a holistic solution. • Focus on securing the cloud applications. • Once the North America market has been established, we will license other distributors and partners in other territories. To this end, Secure Channels SA has entered into a global agreement with the International Telecommunications Union’s IMPACT group, through which it is being introduced to more than 140 countries see: http://impact- alliance.org/countries/alphabetical-list.html Other corporate members of IMPACT include HP, IBM, Microsoft, Intel and Cisco as examples. • Undertake discussions with the IT major players such as Microsoft, Google, HP, Cisco, AWS and Intel (already having early discussions with Cisco and HP), primarily as potential customers and distributors. • Key Offerings: • High-end data encryption for businesses, government agencies, non-profits and High Net Worth individuals. • Data protection in the cloud, at rest, and in transit. • Pivot products and solutions to address Mobile and Bring-Your-Own-Device (BYOD) implications, as well as Language Translation capabilities. Secure Channels Inc Technology WHY WE ARE THE BEST
  • 19. Richard Blech: CEO Secure Channels Inc - is an entrepreneur, investor and innovator. His primary business focus is on data security and technology and he is interested in sustainability. As managing member of Imperium Management LLC, Richard actively invests in technologically advanced and ecologically friendly ventures. He has a discerning ability to determine market trends that are not only lucrative, but also pave the way to technological advancement across the globe. Richard is the President of Secure Channels Inc. and the CEO of Proximity LLC - both high tech/data security companies. Malcolm Hutchinson: CEO Secure Channels SA - is a highly experienced Australian Executive and entrepreneur residing in Switzerland with extensive experience in both the public and private sectors. He was an executive at CEO level (10 years) in Australian local government, worked on United Nations IT projects for 4 years then became an entrepreneur. He co-founded two successful start-ups in Switzerland including Living PlanIT SA and WISeKey SA. Malcolm is renowned as a business strategist having in particular developed the business concepts for WISeKey (current valuation in excess of $200 million) and Living PlanIT (current valuation in excess of $1 billion). He was named as one of the IT industry’s “Movers and Shakers” by IT Watch USA in 2001. Robert Coleridge: CTO Secure Channels Inc & SA- is long time Systems Analyst/Software Engineer with over 35 years' experience, 12 of those at Microsoft as a Senior Software Design Engineer. At Microsoft he spent the majority of his time in the areas of creating and building strategic and visionary working prototypes for a number of the executives including Gates and Ballmer. While at Microsoft Robert also had the opportunity to play key roles in the development and vision that was to become .NET and WCF. He designed and implemented Microsoft's first SOAP toolkit which today is better known as web services. Today more than 6 billion devices including every smart phone relies on the software Robert helped create. Mike Vallejo: CIO- -Secure Channels Inc - is an innovator in the technology industry for over 20 years. His vast experience has involved managing, maintaining, and directing the scope of information for business. Including user support, maintenance of network/server/database/application infrastructure, security policy, application software support and development, IT controllership and technology integrations. He has developed software for B2B, the health care industry as well as the security field. Mike’s specialty is program budget management, technology operations, engineering and business relationship partnering to align information technology with the strategic direction of the company. Secure Channels Inc Technology Management
  • 20. TRN : Secure web hosting, Encrypted Document Management, Video Streaming services, Disaster Relief programs Kaspersky: Appliance integration, Endpoint Protection with encryption XAC Automation and Zakus: Encryption on POS devices Ciphertex: Encryption of their NAS and Backup devices Video Surveillance Now: Encryption of video in the Video Security sector South Coast Plaza: Secure Cloud Services, Encryption of Analytic data from Proximity Backpac: Cloud services, Encryption, Proximity, Language Agnostic Communications Invincea: Integration of their End point protection with encryption for data and OS protection Gold Fax: Encryption integration of the fax servers on Gold fax software. Secure Channels Inc Technology Clients
  • 21. Secure Channels Inc. Debuts New Patented Encrypted Technology at BlackHat 2014 http://finance.yahoo.com/news/secure-channels-inc-debuts-patented-100100805.html Black Hat Hackers Fail to Crack Encryption Tech http://www.dfinews.com/news/2014/08/black-hat-hackers-fail-crack-encryption-tech ‘Impenetrable’ encryption arrives to lock down Internet of Things | Third Certainty http://thirdcertainty.com/breaking-news/impenetrable-encryption-arrives-to-lock-down-internet-of-things/ Secure Channels Inc Technology Press Release
  • 24. Proximity LLC Software Technology Secure Channels Encryption Proximity Shop Store Products Coupons Push Ads Alerts
  • 26. Proximity LLC Technology Wireframe  Splash Page – design is to be determined by client, but with reference to our branding logo image.  Featured Page – featured product page. Displays all featured products from all stores.  Categories Page – categories page which is named or titled after the client.  Stores Page – view the listings of all Church's in range of the proximity.  Profile Page – profile page for customer or registered user.  Search Page – search functionality for stores, products, specials, etc.
  • 27. Proximity LLC Technology Wireframe  Product Page – individual product page.  Coupon Page – displays QR code for redemption to stores.  Buy Now Page.
  • 28. Proximity LLC Management  Richard Blech – CEO As CEO of Proximity LLC, a company directly partnered with Secure Channels Inc for which its products enhance the performance of a wide spectrum of enterprises, addressing such issues as securing accurate demographic data, management of internet commerce, fraud detection and IP location technology. Blech has taken a hands-on approach at the various companies that he is affiliated with, often using his financial expertise to oversee the financial aspects of these businesses. His research and insight has led to cost-effective, energy efficient improvements as major value added enhancements to his technological partners.  Ray Rainier – CTO Ray is a technology professional who has worked for Microsoft Corporation as an Enterprise Consultant. At Microsoft, he was assigned in the Midwest region to provide consulting services to Fortune 100 companies. An experienced team leader and collaborator, Ray worked with teams at Accenture, Dell, HP and Intel on various enterprise projects.  Miguel Carlos – COO Miguel is a driven entrepreneur with a strong command and expertise of business development and client management experience. Miguel is a high performing, strategic thinking leader – his skillset lending itself to client relations and business partnering. Miguel believes presentational and interpersonal communication is the cornerstone for building businesses in today’s impersonal technological markets. Fostering new companies, by assessing needs, generating options, and implementing solutions in collaboration with clients and stakeholders. Comfortable from nurturing the original idea to requirements gathering and needs identification phase through to completion and management of the company. Miguel is instrumental in building synergy and bringing the team to form a technology company geared for the future. Miguel is a co-founder of Proximity LLC.  Mike Vallejo – CIO Mike is an innovator in the technology industry for over 20 years. His vast experience has involved managing, maintaining, and directing the scope of information for business. Including user support, maintenance of network/server/database/application infrastructure, security policy, application software support and development, IT controllership and technology integrations. He has developed software for B2B, the health care industry as well as the security field. Mike’s specialty is program budget management, technology operations, engineering and business relationship partnering to align information technology with the strategic direction of the company.
  • 29. Proximity LLC Vertical Market Rollout Airports Shopping Travelers Parking Retail Point of Sale Shopping Analytics Trends Entertainment Stadiums Concerts Sports M Commerce Online Shopping Advertising