Secret Double Octopus Named “Best in Class” | Read Aite's 2021 Passwordless Report
Aite Group Passwordless Matrix Report 2021

Octopus Blog | Standards and certifications

What is SAML and how it's used?

Blog

Thursday September 3, 2020

What is SAML and how is it being used?

What is SAML? Security Assertion Markup Language (SAML) is a computer protocol that allows users to reuse their authentication credentials to log into multiple applications, instead of setting up new accounts with new credentials for every application. SAML is not the only protocol that does this. OpenID Connect (ODIC), for example, is a very popular...
Read more

About Octopus

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

The Guide to FIDO and WebAuthn

Blog

Tuesday June 30, 2020

Your Complete Guide to FIDO, FIDO2 and WebAuthn

In the past years, advances in technology, a growing number of horrifying data breaches, and increasing awareness of the need to protect online personal and corporate accounts have led to growing efforts in creating multi-factor authentication (MFA) technologies. But while the dream of creating authentication mechanisms that don’t rely on just memorizing and typing passwords...
Read more

Active Directory and Federated Identities

Blog

Wednesday May 20, 2020

LDAP, Active Directory and Federated Identity: What You Need to Know

Managing identities across an enterprise is one of the bigger challenges facing the world of digital security. In a company where large numbers of users access multiple applications in a diverse work environment, managers need reliable tools that allow smooth access for workers, while maintaining strong authentication standards. Making Some Order When looking at the...
Read more

Federated Identity VS Single Sign-On

Blog

Friday January 3, 2020

Federated Identity VS Single Sign-On

For today’s enterprise, maintaining an arsenal of effective network tools is all about access. Organizations need to provide access to a slew of online programs and applications to the right people in order to streamline operations. To accomplish this, organizations utilize methods to maximize the use of digital identities for multiple users. Single Sign-On (SSO)...
Read more

Strong Authentication for PSD2

Blog

Thursday January 31, 2019

Establishing strong authentication for PSD2

September 14, 2019 will mark a milestone date for the online payment industry. That’s when the Strong Customer Authentication (SCA) regulation will come into effect. As part of the Revised Payment Service Directive (PSD2), SCA imposes stricter security rules on payment service providers to protect customers and merchants against the mounting threat of online fraud....
Read more

Virtual Desktop (VDI) Authentication

Blog

Thursday December 20, 2018

Virtual Desktop (VDI) Authentication

The Bring Your Own Device (BYOD) approach is highly embraced by organizations, connecting users to corporate networks to reduce costs or as an easy solution for remote workers. The main beneficiaries of the trend are Virtual Desktop Infrastructure (VDI) such as Citrix, VMware and Microsoft,  For many organizations and companies, Virtual Desktops provide an interesting...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

Passwords are Vulnerable

Blog

Wednesday December 5, 2018

Password- Based Authentication: Vulnerabilities And Alternative Solutions

The password has been the staple of authentication for years. While passwords are still very much a part of our information technology landscape, they have been on the decline for more than a decade. “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just...
Read more