Sandcastles Technology runs  through a series of complex procedures to test,  to determine if the users device has been compromised BEFORE permitting any access to the virtual player, and remote encrypted server (Cloud). If the user’s device has been compromised  access to the Cloud will be prohibited, until the compromises has been cleaned from the user’s computer, down to the kernel level. This process will occur every time the user signs-on to access their data in the Sandcastles Technology Virtual player and Cloud. That is what differentiates the Sandcastles Technology from all the rest. No other Cloud technology conducts a security check of the user’s computer prior to accessing their Cloud.  



Consider a situation that might draw the interest of top-level hackers, such as a professional who wants to view their medical records online. Now, the hackers might mount a successful attack on the hospital servers themselves. Sandcastles Technology wouldn’t protect against that. We deal instead with unmanaged clients such as the professional’s own laptop.

Say that hackers have already broken in to this professional’s laptop. They can see their mouse movements and clicks. They can see every keystroke they enter. They can see what’s on their screen. They can even take over their computer if they wish.

The professional wants to view their medical records, so first they download and install the Sandcastles Technology player. The hackers can’t prevent this without disclosing their presence, so they allow it to continue. Then the professional launches the Sandcastles Technology player to view their medical records.

This is where things get difficult for the hackers. Although the professional goes on to view their medical records in the Sandcastles Technology player without incident, the hackers can’t follow along. The hackers’ view of the professional’s computer screen just has snow on it in place of the Sandcastles Technology player window. Also, the hackers stop seeing keystrokes from the professional’s keyboard or mouse movements from the professional’s mouse. The hackers can’t tell remotely what’s going on. The hackers are thwarted.

Let’s say these hackers are more persistent than most, and they record the encrypted network transactions between the professional’s laptop and the hospital, and the hackers also download and dissect the Sandcastles Technology player, which is easily obtainable. What they will find if they dissect the player, which is many man months of work, is that the software that would allow them to communicate with the Sandcastles Technology server in a meaningful way isn’t part of the Sandcastles Technology player, so they can’t reverse engineer it.

Let’s say, after much effort, they succeed in reverse engineering the Sandcastles Technology player and server interaction in a single instance. Then they will quickly find that every Sandcastles Technology interaction uses different software and a different protocol, effectively preventing any effort, no matter how massive, to reverse engineer Sandcastles Technology security over time.
When software is written to try to flexibly respond to the Sandcastles Technology protocol, it won’t be able to automatically determine what response is needed. A human hacker, who might be able to determine what response is needed given time to think about it, won’t be given any time to think about it, so his responses will always be way too slow to pass muster.

Moreover, during any such effort, the hackers would constantly be vulnerable to discovery every time they fail in an attempt to hack the system. After discovery, the FBI and other interested parties would be alerted by the hospital’s network security team, be shown the evidence, and become involved in the matter, and that would be the likely end of the security threat.

Homeland Security

The need for Internet access is a requirement in practically all modern computer networks. Although there are many effective technologies in existence for preventing access to private government networks, none are foolproof, simply due to the fact that browser access to the Internet, however well regulated, can always allow Trojan Horse viruses, spyware, and other malware onto computers inside the firewall. From there, most malware is identified and eliminated instantly, but there are those few threats that are either too new to have been identified, custom-made, or polymorphic in their footprint. What about these threats? Sandcastles adds another unique bastion to the security profile of any network based on its entirely novel patented approach to data security.

Sandcastles Technology starts with the assumption that the computer in use has been compromised. What now? The Sandcastles Technology agent operates at the system or driver layer of the computer. Here, malware has nowhere to hide, because only a very limited number of easily recognizable software programs require system level access, and any unauthorized code can be easily and immediately identified by the process of deduction rather than having to be specifically identified as a threat. This, coupled with your preferred military/government class encryption carried down to the hardware layer of the computer, allows for secure access and even manipulation of specific data in a virtual bubble of safety while avoiding risk that the data will be compromised. Additionally, if the Sandcastles Technology agent identifies unauthorized code before or even during access, the data under protection is removed from the local environment, obviating the possibility of compromise.


Media piracy is rampant in the world today, cutting heavily into business profits. Sandcastles Technology is a patented novel approach to remote data protection and rights management that confounds today’s popular hacks as well as tomorrow’s. The Sandcastles Technology player allows photos, videos, and sound files to be accessed over the Internet inside a controlled and secure virtual environment where data stays encrypted all the way down to the computer hardware. Even if this environment is broken into by a hacker, the data inside is still encrypted and therefore remains secure. Sandcastles can be used for secure distribution of photos, videos, and sound files. It can also be used to establish secure peer-to-peer networks where photos, videos, and sound files can be distributed. In both cases, the owner retains complete control of access rights: when, how long, how many times, etc. the content can be viewed.


  • Certified Encryption protocols – integrated,  and insulated with Sandcastles Technology and Validated  with single or two factor Authentication
  • New Sandcastles Technology is engineered not only to encrypt/decrypt the entire bit-by-bit of the data within  the file or a disk (including the Boot Sector, Operating System, Temporary and Swap files) but wraps them within a  specify envelop
  • Operating System Independent, works with all Operating Systems and requires no drivers
  • U.S. government certified encryption algorithms NIST and FIPS
    Inexpensive cost per user


  • Unlike other technologies, protects data, and Instead, creates a secure environment inside the computer.
  • If the environment can’t be secured, the content is withheld and the user is informed.
  • Unlike other technologies, doesn’t leave content behind, even in encrypted form.
  • Data stays encrypted until it is displayed or played.
  • Data entered by keyboard, mouse, etc. has a separate secure path.
WordPress and WHMCS integration by i-Plugins