Getting started as a Reseller
Lochbox is redefining the standard for secure communications and our channel partners are the frontrunners of this movement.

Lochbox resource library
How it works
Features and benefits
Compliance
Remediation
Built from the ground up with Zero Trust Architecture
Zero Trust is a strategic approach to digital privacy and security that eliminates implicit trust in an organization, app, or service by continuously validating every stage of a network interaction.
The following terms describe various principles required for Zero Trust Architecture. Reference them with the table below to see what Lochbox does to ensure that your communications are protected every step of the way (and how other channels might be putting you at risk).*
Independent device tracking (A) – Tracking of the device, not just the user.
Two-factor authentication (B) – Allows the use of third-party authenticator apps.
No cross-device sessions (C) – All device sessions must be independently validated.
Encryption at rest (D) – Content is encrypted on service provider’s servers.
Independently controlled key server (E) – Encryption key access is under the sole discretion of the account owner.
Requires mTLS (F) – Both user and server require mutual verification of each other’s TLS certificate.
Industry security compliance (G) – Meets major security/privacy compliance standards like HIPAA, Sarbanes-Oxley, etc.
Independent device tracking – Tracking of the device, not just the user.
Two-factor authentication – Allows the use of third-party authenticator apps.
No cross-device sessions – All device sessions must be independently validated.
Encryption at rest – Content is encrypted on service provider’s servers.
Independently controlled key server – Encryption key access is under the sole discretion of the account owner.
Requires mTLS – Both user and server require mutual verification of each other’s TLS certificate.
Industry security compliance – Meets major security/privacy compliance standards like HIPAA, Sarbanes-Oxley, etc.
* The absence of an X can mean that the service provider does not have the associated feature, does not advertise the use of such a feature, or their utilization of such a strategy is insufficient to be prescribed as zero trust.
! Not only are such strategies not being utilized but their absence is known to be exploited and presents inherent risks to users.