• Secret Double Octopus Among CIO's 20 Most Promising Identity Governance Solution Providers

Secret Double Octopus Among CIO’s 20 Most Promising Identity Governance Solution Providers

Eighty percent of hacking-related breaches exploit stolen or weak passwords. Even worse, current security practices of token-based authentication in the form of OTPs and SMS have also been compromised. These challenges are compelling organizations to adopt new approaches to securing their data, systems and overall business interests. Secret Double Octopus, a prominent player in password-free authentication, protects data, systems and identities through a multi-shield authentication process.

What Makes it Unique

Secret Double Octopus turns mobile phones into authentication devices. Unlike existing solutions based on PKI, the Israeli security startup leverages secret sharing algorithms to minimize user vulnerability while protecting data and streamlining user experience when accessing resources. “Our patented technology is based on a mathematically unbreakable scheme that enables a password-free authentication experience, which is both more secure and user-friendly than existing authentication measures,” said Raz Rafaeli, the CEO and Co-founder of Secret Double Octopus.

Read Full Article

By Secret Double Octopus Staff|November 15th, 2017|Categories: In the News|Tags: , , |

About the Author: Secret Double Octopus Staff

With a combined experience of over 100 years in the cybersecurity industry, our staff shares their knowledge and vision.

Get in Touch


Get in Touch With Sales