fbpx

Getting started as a Channel Partner

Lochbox is redefining the standard for secure communications and our channel partners are the frontrunners of this movement.

How it works

Features and benefits

Compliance

Remediation

Built from the ground up with Zero Trust Architecture

Zero Trust is a strategic approach to digital privacy and security that eliminates implicit trust in an organization, app, or service by continuously validating every stage of a network interaction.

The following terms describe various principles required for Zero Trust Architecture. Reference them with the table below to see what Lochbox does to ensure that your communications are protected every step of the way (and how other channels might be putting you at risk).*

Independent device tracking (A) – Tracking of the device, not just the user.

Two-factor authentication (B) – Allows the use of third-party authenticator apps.

No cross-device sessions (C) – All device sessions must be independently validated.

Encryption at rest (D) – Content is encrypted on service provider’s servers.

Independently controlled key server (E) – Encryption key access is under the sole discretion of the account owner.

Requires mTLS (F) – Both user and server require mutual verification of each other’s TLS certificate.

Industry security compliance (G) – Meets major security/privacy compliance standards like HIPAA, Sarbanes-Oxley, etc.

Independent device tracking – Tracking of the device, not just the user.

Two-factor authentication – Allows the use of third-party authenticator apps.

No cross-device sessions – All device sessions must be independently validated.

Encryption at rest – Content is encrypted on service provider’s servers.

Independently controlled key server – Encryption key access is under the sole discretion of the account owner.

Requires mTLS – Both user and server require mutual verification of each other’s TLS certificate.

Industry security compliance – Meets major security/privacy compliance standards like HIPAA, Sarbanes-Oxley, etc.

Lochbox Premium
Slack
WhatsApp
Zoom
Signal
iMessage
Cellular & SMS
Microsoft Teams
A
X
X
B
X
X
X
C
X
X
D
X
X
X
X
!
X
E
X
X
F
X
G
X
X
!
X
!
!
X
Lochbox Premium
Slack
WhatsApp
Zoom
Signal
iMessage
Cellular & SMS
Microsoft Teams
Independent device tracking
X
X
Two-factor authentication
X
X
X
No cross-device sessions
X
X
Encryption at rest
X
X
X
X
!
X
Independently controlled key server
X
X
Requires mTLS
X
Industry security compliance
X
X
!
X
!
!
X

* The absence of an X can mean that the service provider does not have the associated feature, does not advertise the use of such a feature, or their utilization of such a strategy is insufficient to be prescribed as zero trust.

! Not only are such strategies not being utilized but their absence is known to be exploited and presents inherent risks to users.

Questions?