Secure Information Exchange:
A Portal Story
A company’s information is its most valuable asset; it works hard to protect it.
If companies existed in a bubble, they could lock up their information and control when and how it’s accessed.
Success depends on the ability to move information in, out, and around the company… securely.
Companies operate in a network of external partners, customers, vendors, suppliers, employees, etc.
But they don’t.
Meeting this need has created a large and ubiquitous information transfer portal industry.
Portals, portals, EVERYWHERE…
Unfortunately, these portals are routinely breached.
Why?
A company’s information is its most valuable asset; it works hard to protect it.
If companies existed in a bubble, they could lock up their information and control when and how it’s accessed.
But they don’t.
Companies operate in a network of external partners, customers, vendors, suppliers, employees, etc.
Success depends on the ability to move information in, out, and around the company… securely.
Meeting this need has created a large and ubiquitous information transfer portal industry.
Portals, portals, EVERYWHERE…
Unfortunately, these portals are routinely breached.
Why?
The answer has 4 parts:
Quantum Computing
Bad actors are gathering and storing encrypted data now… to decrypt later using quantum computers.
The only solution is to use Post-Quantum Cryptography (PQC) algorithms… which existing portals don’t use.
Architecture
‘Hub & spoke’ networks used in existing portal products create vulnerabilities:
- Porous by design
- Single point of failure
- Finite & large targets
- Insider threat risk
User Frustration
The user experience with existing portals can be difficult.
Frustrated users use insecure information exchange methods, like email.
Dictated Trust
Current portals force companies to expose information to people outside their value chain, like:
- Local IT Admins
- MSP Admins
- Vendor Admins
These are significant problems that leave companies using portals vulnerable and exposed to damage and loss.
PortalSIX addresses these problems.
- Built on a decentralized architecture
Avoids issues with ‘hub & spoke’ networks like single points of failure, creating large targets of opportunity, and enabling insider threats
- Has intuitive and familiar user interfaces and experiences
Avoids creating user frustration that drives them to become unwitting insider threats
- Creates a zero-trust environment; only people who need info have it
Avoids having to give any administrator – internal or external – access to information
- Includes ONLY cryptographic algorithms stated as post-quantum by the NSA and NIST
Future-proofs customers by providing quantum resilience now and ‘stopping the clock’ on Harvest attacks that collect and store their data.
Who Needs PortalSIX?
Companies that need PortalSIX include those concerned with:
- Confidentiality of information moving via portals
- Bad user behavior and/or shadow IT
- Insider threats from admins or users
- Standards compliance (e.g., HIPAA)
- Future-proofing against quantum threat
With over 75% first-round funding already secured, we’re looking for visionary investors to join us.
Interested to learn more?