Active Directory Authentication

Password-free, high assurance authentication for Active Directory domains, prevent password based attacks while delighting your users with a simple secure mobile authentication, completely passwordless!

  • Active directory and LDAP - Secret double octopus

LDAP, Active Directory and Federated Identity: What You Need to Know

Managing identities across an enterprise is one of the bigger challenges facing the world of digital security. In a company where large numbers of users access multiple applications in a diverse work environment, managers need reliable tools that allow smooth access for workers, while maintaining strong authentication standards.   Making Some Order When looking at the most common tools used in [...]

By |May 14th, 2018|Categories: Articles|Tags: , |
  • Active directory - Directory physical

Microsoft’s Commandment: Thou Shalt Not Worship (Password) Idols

Published at Infosecurity on May 13, 2018 by Raz Rafaeli Why do we have a situation where hackers are able to take advantage of Microsoft's Active Directory bugs? No matter how you slice it, the error in the model can be traced to one factor – the password. If that were not compromised, hackers would not have an opportunity to carry out [...]

  • compromise active directory

Poor Visibility, Weak Passwords Compromise Active Directory

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

  • Active Directory Authentication

Password-Free, High Assurance Authentication for Active Directory Domains

With the release of this new solution, Secret Double Octopus has delivered the first authentication tool for AD that completely unburdens users from passwords while offering a more secure model.   Get a demo here  Seamless Authentication for Users, No Compromise on Security Administrators of an organization’s AD access their control of resources through passwords. This means that a just one [...]