Home About Team Solutions Contact


Los Angeles, California U.S.A.




Sandcastles technology runs  through a series of complex procedures to test,  to determine if the users device has been compromised BEFORE permitting any access to the virtual player, and remote encrypted server (Cloud). If the user’s device has been compromised  access to the Cloud will be prohibited, until the compromises has been cleaned from the user’s computer, down to the kernel level. This process will occur every time the user signs-on to access their data in the Sandcastles Virtual player and Cloud. That is what differentiates the Sandcastles technology from all the rest. No other Cloud technology conducts a security check of the user’s computer prior to accessing their Cloud.  


  •  Hardware based Real-Time encryption: external hardware devices
  •  Certified Encryption protocols – integrated,  and insulated with Sandcastles technology and Validated  with single or two factor Authentication
  •  New Sandcastles technology is engineered not only to encrypt/decrypt the entire bit-by-bit of the data within  the file or a disk (including the Boot Sector, Operating System, Temporary and Swap files) but wraps them within a  specify envelop
  •  Operating System Independent, works with all Operating Systems and requires no drivers
  •  U.S. government certified encryption algorithms NIST and FIPS
  •  Inexpensive cost per user


  •  Unlike other technologies, protects data, and Instead, creates a secure environment inside the computer
  •  If the environment can't be secured, the content is withheld and the user is informed
  •  Unlike other technologies, doesn't leave content behind, even in encrypted form
  •  Data stays encrypted until it is displayed or played  
  •  Data entered by keyboard, mouse, etc. has a separate secure path

Sandcastles Description

To describe what Sandcastles' technology does, let's look at a possible real-world scenario. Consider a situation that might draw the interest of top-level hackers, such as a celebrity who wants to view her medical records online. Now, the hackers might mount a successful attack on the hospital servers themselves. Sandcastles wouldn't protect against that. We deal instead with unmanaged clients such as the celebrity's own laptop. Say that hackers have already broken in to this celebrity's laptop. They can see her mouse movements and clicks. They can see every keystroke she enters. They can see what's on her screen. They can even take over her computer if they wish. The celebrity wants to view her medical records, so first she downloads and installs the Sandcastles player.

The hackers can't prevent this without disclosing their presence, so they allow it to continue. Then the celebrity launches the Sandcastles player to view her medical records. This is where things get difficult for the hackers.

A human hacker, who might be able to determine what response is needed given time to think about it, won't be given any time to think about it, so his responses will always be way too slow to pass muster.

Moreover, during any such effort, the hackers would constantly be vulnerable to discovery every time they fail in an attempt to hack the system. After discovery, the FBI and other interested parties would be alerted by the hospital's network security team, be shown the evidence, and become involved in the matter, and that would be the likely end of the security threat.

Homeland Security

The need for Internet access is a requirement in practically all modern computer networks. Although there are many effective technologies in existence for preventing access to private government networks, none are foolproof, simply due to the fact that browser access to the Internet, however well regulated, can always allow Trojan Horse viruses, spyware, and other malware onto computers inside the firewall. From there, most malware is identified and eliminated instantly, but there are those few threats that are either too new to have been identified, custom-made, or polymorphic in their footprint. What about these threats? Sandcastles adds another unique bastion to the security profile of any network based on its entirely novel patented approach to data security.

Sandcastles starts with the assumption that the computer in use has been compromised. What now? The Sandcastles agent operates at the system or driver layer of the computer. Here, malware has nowhere to hide, because only a very limited number of easily recognizable software programs require system level access, and any unauthorized code can be easily and immediately identified by the process of deduction rather than having to be specifically identified as a threat. This, coupled with your preferred military/government class encryption carried down to the hardware layer of the computer, allows for secure access and even manipulation of specific data in a virtual bubble of safety while avoiding risk that the data will be compromised. Additionally, if the Sandcastles agent identifies unauthorized code before or even during access, the data under protection is removed from the local environment, obviating the possibility of compromise.


Media piracy is rampant in the world today, cutting heavily into business profits. Sandcastles is a patented novel approach to remote data protection and rights management that confounds today's popular hacks as well as tomorrow's. The Sandcastles player allows photos, videos, and sound files to be accessed over the Internet inside a controlled and secure virtual environment where data stays encrypted all the way down to the computer hardware. Even if this environment is broken into by a hacker, the data inside is still encrypted and therefore remains secure. Sandcastles can be used for secure distribution of photos, videos, and sound files. It can also be used to establish secure peer-to-peer networks where photos, videos, and sound files can be distributed. In both cases, the owner retains complete control of access rights: when, how long, how many times, etc. the content can be viewed.