Secret Double Octopus Named “Best in Class” | Read Aite's 2021 Passwordless Report
Aite Group Passwordless Matrix Report 2021

Octopus Blog | Octopus Labs

The 2021 Passwordless Report

Blog

Wednesday June 2, 2021

The Aite 2021 Passwordless Report: Who is “Best in Class”?

The passwordless authentication market is fast-growing, and it is becoming increasingly affordable and easy to deploy identity access management that do away with passwords. But with so many providers and technologies, how do you make sure to choose the right solution for your enterprise? Recently, Aite Group, a business and technology advisory with offices in...
Read more

About Octopus

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

Best of 2020 in our Blogs

Blog

Tuesday December 29, 2020

Best of 2020: Our most-read blogs of the year

This year has been like no other, but our amazing staff stayed focused on securing your domain amid all the unexpected changes. And while COVID-19 and its effects on the workplace were hot topics in many circles, our readers mainly wanted interesting and useful guides to the world of passwordless. Here are the stars of...
Read more

What is SAML and how it's used?

Blog

Thursday September 3, 2020

What is SAML and how is it being used?

What is SAML? Security Assertion Markup Language (SAML) is a computer protocol that allows users to reuse their authentication credentials to log into multiple applications, instead of setting up new accounts with new credentials for every application. SAML is not the only protocol that does this. OpenID Connect (ODIC), for example, is a very popular...
Read more

SIM Swapping is a Real Threat

Blog

Monday February 24, 2020

SIM Swapping – The End Of 2nd Factor Authentication?

Many online services allow, and sometimes require, users to secure their accounts with a registered mobile phone number. This is a common and trusted method for two-factor authentication (2FA), using a phone call or an SMS message to verify identity when logging in from a new device or resetting a password. This standard approach, however,...
Read more

Air Gap Networks & MFA

Blog

Tuesday August 20, 2019

Air Gap Network Multi Factor Authentication

Air gaping. It’s the ‘nuclear option’ of network security. By separating a machine from any other computer, managers can all but guarantee that it cannot be penetrated remotely. Air gaping, or network separation as it is often known, is the step taken by the serious neurotics among users or because the regulatory body you report...
Read more

Certificates and Inherit Trust

Blog

Sunday September 23, 2018

Certificates and Inherit Trust

On the Octopus Blog, we’ve delved quite a bit into the vulnerabilities of contemporary encryption standards. The system of Public Key Infrastructure (PKI) which forms the basis of most of the worlds authentication platforms, while presenting a powerful, easy to use encryption model, still left several holes through which attackers can breach networks and steal...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

Zero Knowledge Proof

Blog

Monday May 21, 2018

Zero Knowledge Proof – What Peggy Knows About Victor

Zero knowledge proof authentication is the basis of modern-age authentication. It allows for the highest level of security, by ensuring passwords, transactions and conversations don’t get compromised when transferred over an unsecured connection. In this article we will look at zero knowledge proof to understand the need for it, how it works, and where it’s...
Read more