Securing your identity...
Securing your data...

STRATIDGIC - Safe From The Start

Cybersecurity With The Latest Decryption. Tokenization.

STRATIDGIC Protects you and everyone you send, store and create your information with living in this digital world.

animated background

What We Do

The Identity strategy to build a marketplace & communication platform that:

  1. Permanently protects our user's identities & financial information.
  2. Proves who everyone and every IOT device is to each other before allowing access or the exchange of information.
  3. Makes secure the remote access and remote control of our nation's critical infrastructure and our user's IOT devices.
  4. Anonymizes everyone's data giving industry and government the actionable intelligence capabilities to securely make our data work for our mutual welfare.
  5. Authenticates the quality of the data AI learns from, the data AI processes that impacts the authenticity and quality of the resulting AI outcomes.
what we do
Do you care

Why Care!

If you care about permanently protecting who you are, what you do and who you do your business with as you communicate, conduct transactions, and store your data then enroll with our platform services and enjoy competitive advantages on price, profits, & our protections.

If you are responsible for the protection of any of our nation's sixteen critical infrastructure sectors or our national defense you need to learn the difference between the temporary encryption protections we use today and the benefits of permanently securing our nations data, remote access, and remote control with our reciprocal authentication and anonymization technologies.

If you need the actionable intelligence capabilities that only our technologies make possible then work with us to customize adaptions of our platform for your specific industry's marketing, national security, & DOD requirements.

If you want to control the quality and ensure the authenticity of the AI processes that will control the quality and authenticity of AI's impact on you or your organization join our marketplace and communication platform to take control of AI's data source.

Encryption A Flawed Strategy Is Everyone's Problem

Encryption uses complex math to hide everything until someone finds a way to simplify that math and reveal everything once hid. Quantum computers will simplify the asymmetric encryption protecting our information today, forcing everyone to change how we protect ourselves.

Everyone Must Transition

NIST (National Institute for Standards and Technology) expects us to spend $189 billion transitioning to their eight quantum resistant encryption replacements and endure the cost of exposing all our previously encrypted data.

Then Change, and Pay Endlessly

When each of the eight NIST replacements fail we will be expected to endure more transition costs and the exposure of all our data again and then with each future failure continuing an endless cycle of transition costs and encryption failures.

We Cannot Afford This Waste.

Our Creative Team

Our Team

James O'Brien CEO, principal inventor, former CPA, designed, and has managed EMR software for a Tampa Medical Clinic since 2002. Our software engineering team built the first proof of concept of US Patent 8799022 and is building and testing our current software projects including an overhaul of our EMR software.

James O'Brien

chef-1

Gisele Riscile

chef-1

Aditya Singh

chef-1