Secure Information Exchange:
    A Portal Story

    A company’s information is its most valuable asset; it works hard to protect it.

    If companies existed in a bubble, they could lock up their information and control when and how it’s accessed.

    Success depends on the ability to move information in, out, and around the company… securely.

    Companies operate in a network of external partners, customers, vendors, suppliers, employees, etc.

    But they don’t.

    Meeting this need has created a large and ubiquitous information transfer portal industry.

    Portals, portals, EVERYWHERE…

    Unfortunately, these portals are routinely breached.

    Why?

    A company’s information is its most valuable asset; it works hard to protect it.

    If companies existed in a bubble, they could lock up their information and control when and how it’s accessed.

    But they don’t.

    Companies operate in a network of external partners, customers, vendors, suppliers, employees, etc.

    Success depends on the ability to move information in, out, and around the company… securely.

    Meeting this need has created a large and ubiquitous information transfer portal industry.

    Portals, portals, EVERYWHERE…

    Unfortunately, these portals are routinely breached.

    Why?

    The answer has 4 parts:

    Quantum Computing

    Bad actors are gathering and storing encrypted data now… to decrypt later using quantum computers.

    The only solution is to use Post-Quantum Cryptography (PQC) algorithms… which existing portals don’t use.

    Architecture

    ‘Hub & spoke’ networks used in existing portal products create vulnerabilities:

    • Porous by design
    • Single point of failure
    • Finite & large targets
    • Insider threat risk

    User Frustration

    The user experience with existing portals can be difficult.

    Frustrated users use insecure information exchange methods, like email.

    Dictated Trust

    Current portals force companies to expose information to people outside their value chain, like:

    • Local IT Admins
    • MSP Admins
    • Vendor Admins

    These are significant problems that leave companies using portals vulnerable and exposed to damage and loss.

    PortalSIX addresses these problems.

    PortalSIX logo
    • Built on a decentralized architecture
      Avoids issues with ‘hub & spoke’ networks like single points of failure, creating large targets of opportunity, and enabling insider threats
    • Has intuitive and familiar user interfaces and experiences
      Avoids creating user frustration that drives them to become unwitting insider threats
    • Creates a zero-trust environment; only people who need info have it
      Avoids having to give any administrator – internal or external – access to information
    • Includes ONLY cryptographic algorithms stated as post-quantum by the NSA and NIST
      Future-proofs customers by providing quantum resilience now and ‘stopping the clock’ on Harvest attacks that collect and store their data.

    Who Needs PortalSIX?

    Companies that need PortalSIX include those concerned with:

    • Confidentiality of information moving via portals
    • Bad user behavior and/or shadow IT
    • Insider threats from admins or users
    • Standards compliance (e.g., HIPAA)
    • Future-proofing against quantum threat

    With over 75% first-round funding already secured, we’re looking for visionary investors to join us.

    Interested to learn more?