Why Octopus 2017-08-07T20:31:37+00:00
We’re protecting the user,
by throwing away the keys
START FREE
GET A DEMO

Effective authentication cannot be sustained by traditional and ‘as usual’ methods. There needs to be change, innovation, to match the demand of emerging technologies.
Secret Double Octopus is that change.

Our solution is the first comprehensive platform to replace keys and passwords.

We’re protecting the user,
By throwing away the keys
START FREE
GET A DEMO
No More Passwords
No password security means more protection, not less. In the hands of users, passwords are a vulnerability. Our authentication wall is invisible to the user. There are security factors, but the user does not need to remember or operate it. Secret Double Octopus enables a password-free environment with trust channels established via a mobile phone app.
No password security means more protection, not less. Our authentication wall is invisible to the user. There’s security, but the user does not need to remember or operate it.

Frustration-free Ux

Keyless security isn’t just about removing vulnerabilities. Our authentication platform is designed so anybody can use it – to be seamless, intuitive, and unobtrusive. It’s comprehensive security that’s hidden from the user. No typing of codes, no SMS.

Mobile based authentication

Mobiles have become essential to user-friendly authentication, and our platform runs on both Android and iOS. Beyond the authentication process, it demands little of the user. Secure, but ultimately friendly.

A scalable solution

Key and password management bottlenecks growth. Mass market demands and large IT environments, such as IoT, involve enormous operational costs when delivered alongside conventional authentication. By eliminating the need to manage keys and passwords, our platform drastically reduces cost and enables scalability.

Multi-shield protection
for users and things

When there’s endless possibilities, intruders are unable to play a guessing game. Multiple routes, layers, and shields prevent true interception – and security information cannot be extrapolated from a single share.
Multi-shield authentication is resilient to SMS hijacking, push notification cracking, key theft, man-in-the-middle, and PKI slip-ups.

START FREE
GET A DEMO
Multi-shield protection
for users and things

When there’s endless possibilities, intruders are unable to play a guessing game. Multiple routes, layers, and shields prevent true interception – and security information cannot be extrapolated from a single share.
Multi-shield authentication is resilient to SMS hijacking, push notification cracking, key theft, man-in-the-middle, and PKI slip-ups.

START FREE
GET A DEMO
Secret sharing = proven mathematics, newly applied

At Secret Double Octopus, we’ve created a keyless authentication platform around Secret Sharing: an information-theoretic security algorithm established in 1979 by cryptographers Adi Shamir and George Blakley.

Our authentication uses Secret Sharing for multi-route protection. If a single secret is stolen from the device – or captured in motion – there’s no compromise to security. The platform is resilient.

Secret Double Octopus

No Keys OR Passwords

Frustration Free UX

Multi-Shield Protection

START FREE
GET A DEMO
Secret Double Octopus

No Keys OR Passwords

Frustration Free UX

Multi-SHIELD Protection

START FREE
GET A DEMO