Check Out Our New Solution Brief SecureCo for Law Enforcement
May 31 2024

Cyberattacks on Law Enforcement Can be Minimized with Stealth and Obfuscation

The same digital technology that empowers law enforcement agencies also has a dark side. Agency networks have a large attack surface and discoverable digital internet presence, which savvy adversaries exploit. Obfuscation technology protects agency digital capabilities and personnel from disruption and attack.

Read more
Law Enforcement Cyber

Blogs and Thought Leadership

Resources:

Many IT organizations are not focused on the threat of quantum computing, thinking it several years out.  However, right now encrypted data sent over the internet is being harvested, with the expectation that in three to five years quantum computers will be able to crack the encryption.  Organizations need to act now to avoid being targeted for this Store Now, Decrypt Later (SNDL) threat. SecureCo mitigates the quantum computing threat by making your data-in-transit much harder to harvest.  Threat actors seeking to target the data of a SecureCo customer would have a hard time finding it, since we disassociate the data with the source, route it in randomized, dynamically changing ways, and inject decoy data to make it blend in with benign background traffic. 

SecureCo’s suite of protective obfuscation solutions  includes technology similar to Tor, and has equivalent non-attribution benefits.  We use the same multi-layer encryption, also known as onion routing, to obscure the original source and destination of the data traffic from any node in the middle of the transit route.  Apart from keeping personal user identities private, this method protects the endpoint networks and shields high value data from harvesting or disruption, since it’s much harder for adversaries to identify and target it.  SecureCo’s technology is different from Tor in some important ways.  For one thing, our network is privately managed and operated by us, as opposed to Tor’s open network model of volunteer computing and bandwidth.  This allows us to provide quality of service and guard the network against bad actors. In addition, SecureCo implementations are commonly used for two-way data exchange, where the onion routing extends end-to-end.  This differs from the most common Tor use case, internet browsing, where the last mile exits Tor and does not use onion encryption. The exposure of data exiting Tor creates a vulnerability that the typical SecureCo implementation does not have.

Absolutely not.  SecureCo is fully dedicated to the privacy, security and confidentiality of our clients.  As a rule, SecureCo is delivering already encrypted client traffic, to which we apply additional encryption and security methods.  We do not store client data in any form, and we do not log or record client activity on our network other than at the specific request of the client.  Our architecture not only makes our network blind to the payload of your data, but also to the specific way it is routed, which is constantly changing. We are designed so that a client need only ascribe the minimal amount of trust to SecureCo, because we are not privy to useful client data that would constitute a breach of confidentiality or privacy if our systems were somehow compromised. To make a long story short, we collect no data, and sell no data. 

We get this question a lot.  Right now we are focusing on corporate enterprise, industrial and government customers.  Though we believe we could provide an outstanding solution for the home user, it remains a future prospect rather than a current reality.  That said, we’d love to continue to hear from you and learn more about how we can serve you in the future.  If you operate a small business, please reach out to us at info@secureco.io to discuss if we can accommodate your needs. 

SecureCo products are priced to be competitive with enterprise VPN solutions, though we provide a level of protection and assurance that traditional data-in-transit security solutions do not. Our pricing is principally on a SaaS basis, with variability based on the number of end users or endpoints, and the data throughput levels. There are price breaks at various volume thresholds, so we pass economies of scale along to the customer.  Depending on your implementation, there may be annual gateway server licenses. We are committed to transparency in pricing, and will never hit you with surprise upcharges.