Tel Aviv, Israel– December 5, 2017– Secret Double Octopus, the pioneer of password-free, keyless authentication technology, announced today it was included in Gartner’s 2017 Market Guide for User Authentication as one of the report’s Representative Vendors in the user authentication category.
With 81% of data breaches due to stolen or weak passwords, the need for password-free user authentication is critical for both organizational security and employee user experience. According to Gartner’s 2017 Market Guide for User Authentication, “regulatory requirements continue to be a dominant driver for investment in this market, although a check-box mentality is common. Other drivers include threats and actual incidents, such as phishing attacks, that reveal the weaknesses of legacy passwords.” The report projects that, “mobile push will become the dominant phone-as-a-token method over the next one to two years.”
Secret Double Octopus’ proprietary phone-as-a-token solution enables password-free authentication for workforce use cases, including Windows PC and network login, and access to applications. The Company’s solution uses multichannel techniques to protect against authenticator cloning, man-in-the-middle (MITM) attacks and key theft. The Company currently has customers in Europe, the U.S. and Asia/Pacific.
“Being included in a leading industry report, such as this one, is a company recognition that we sincerely value,” said Raz Rafaeli, CEO of Secret Double Octopus. “Despite massive investment in employee education and password management, employee misuse of passwords is growing at an alarming rate. We feel that our inclusion in this report underscores our excellence in being able to address this formidable challenge.”
The Octopus Authenticator offers a password-free and keyless authentication technology that turns mobile phones into mobile authenticators, eliminating the need for a one-time-password, SMS and authentication tokens. Secret Double Octopus helps enterprises struggling to scale their network security shift away from key-based authenticators to a keyless solution. With one tap, the app initiates a multi-shield authentication process for users in order to verify or reject the login attempt, payment or transaction.