fbpx

Getting started as a Reseller

Lochbox is redefining the standard for secure communications and our channel partners are the frontrunners of this movement.

How it works

Features and benefits

Compliance

Remediation

Built from the ground up with Zero Trust Architecture

Zero Trust is a strategic approach to digital privacy and security that eliminates implicit trust in an organization, app, or service by continuously validating every stage of a network interaction.

The following terms describe various principles required for Zero Trust Architecture. Reference them with the table below to see what Lochbox does to ensure that your communications are protected every step of the way (and how other channels might be putting you at risk).*

Independent device tracking (A) – Tracking of the device, not just the user.

Two-factor authentication (B) – Allows the use of third-party authenticator apps.

No cross-device sessions (C) – All device sessions must be independently validated.

Encryption at rest (D) – Content is encrypted on service provider’s servers.

Independently controlled key server (E) – Encryption key access is under the sole discretion of the account owner.

Requires mTLS (F) – Both user and server require mutual verification of each other’s TLS certificate.

Industry security compliance (G) – Meets major security/privacy compliance standards like HIPAA, Sarbanes-Oxley, etc.

Independent device tracking – Tracking of the device, not just the user.

Two-factor authentication – Allows the use of third-party authenticator apps.

No cross-device sessions – All device sessions must be independently validated.

Encryption at rest – Content is encrypted on service provider’s servers.

Independently controlled key server – Encryption key access is under the sole discretion of the account owner.

Requires mTLS – Both user and server require mutual verification of each other’s TLS certificate.

Industry security compliance – Meets major security/privacy compliance standards like HIPAA, Sarbanes-Oxley, etc.

A
Lochbox Premium
X
Slack
WhatsApp
Zoom
Signal
iMessage
X
Cellular & SMS
Microsoft Teams
B
Lochbox Premium
X
Slack
X
WhatsApp
Zoom
X
Signal
iMessage
Cellular & SMS
Microsoft Teams
C
Lochbox Premium
X
Slack
WhatsApp
Zoom
Signal
X
iMessage
Cellular & SMS
Microsoft Teams
D
Lochbox Premium
X
Slack
X
WhatsApp
Zoom
X
Signal
X
iMessage
Cellular & SMS
!
Microsoft Teams
X
E
Lochbox Premium
X
Slack
X
WhatsApp
Zoom
Signal
iMessage
Cellular & SMS
Microsoft Teams
F
Lochbox Premium
X
Slack
WhatsApp
Zoom
Signal
iMessage
Cellular & SMS
Microsoft Teams
G
Lochbox Premium
X
Slack
X
WhatsApp
!
Zoom
X
Signal
iMessage
!
Cellular & SMS
!
Microsoft Teams
X
Independent device tracking
Lochbox Premium
X
Slack
WhatsApp
Zoom
Signal
iMessage
X
Cellular & SMS
Microsoft Teams
Two-factor authentication
Lochbox Premium
X
Slack
X
WhatsApp
Zoom
X
Signal
iMessage
Cellular & SMS
Microsoft Teams
No cross-device sessions
Lochbox Premium
X
Slack
WhatsApp
Zoom
Signal
X
iMessage
Cellular & SMS
Microsoft Teams
Encryption at rest
Lochbox Premium
X
Slack
X
WhatsApp
Zoom
X
Signal
X
iMessage
Cellular & SMS
!
Microsoft Teams
X
Independently controlled key server
Lochbox Premium
X
Slack
X
WhatsApp
Zoom
Signal
iMessage
Cellular & SMS
Microsoft Teams
Requires mTLS
Lochbox Premium
X
Slack
WhatsApp
Zoom
Signal
iMessage
Cellular & SMS
Microsoft Teams
Industry security compliance
Lochbox Premium
X
Slack
X
WhatsApp
!
Zoom
X
Signal
iMessage
!
Cellular & SMS
!
Microsoft Teams
X

* The absence of an X can mean that the service provider does not have the associated feature, does not advertise the use of such a feature, or their utilization of such a strategy is insufficient to be prescribed as zero trust.

! Not only are such strategies not being utilized but their absence is known to be exploited and presents inherent risks to users.

Questions?