Menu

IoT FEATURE NEWS

Security Solution from Secret Double Octopus Goes Beyond Encryption

By

Security is critical, especially if the IoT is to advance into full enterprise adoption and consumer trust circles. Well, encryption is one of the pathways to get there, and now Secret Double Octopus, a provider of keyless secure communications, has announced a solution that is designed to secure network traffic and authentication beyond the limitations of PKI, SSL and VPN.

Secret Double Octopus (What a name!) helps site-to-site, site-to-cloud, mobile and IoT initiatives overcome the vulnerabilities of most encryption protocols by using secret sharing, which eliminates the need for cryptographic keys and provides protection that experts have postulated as unbreakable.

Hackers are becoming more nimble and accessing ever growing computing power, while IoT and mobile exponentially increase endpoints beyond what can practically be secured with traditional protocols, such as PKI and certificate authorities.

“As hackers become more agile and gain access to increased computing power, the threat of key related exploits becomes even more prevalent,” said Tony Velleca, CIO, UST-Global. “The approach taken by Secret Double Octopus goes beyond traditional encryption and is strongly aligned with our vision for next generation security.”

Image via Pixabay

Secret Double Octopus is the first company to use secret sharing to build a network-focused security solution. This enables organizations to keep network traffic and authentication information-theoretically secure. Data is represented by random bits across multiple routes that only when assembled at its destination can be interpreted, hardening communications as a result.

“Well-publicized data breaches and security hacks underscore the need to more effectively secure critical networks,” said Raz Rafaeli, CEO, Secret Double Octopus. “By utilizing secret sharing, we’ve taken a new approach to security that eliminates the encryption key, an exploited single point of failure in today’s security paradigm.”

I say, let’s let the Octopus out of the bag. 




Edited by Kyle Piscioniere
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

The WR210LG Dual-SIM LTE CPE for Extended Industrial Functionality, Designed by Queclink

By: Alex Passett    3/18/2024

Queclink has unveiled its WR210LG Dual-SIM LTE CPE, designed to meet the demands of the industrial sector.

Read More

Cellular IoT and Automating IoT Device Management and Security: New Data from Juniper Research

By: Alex Passett    3/18/2024

A new study Juniper Research has found that the global number of cellular IoT devices "will increase from 3.4 billion in 2024 to 6.5 billion by 2028."

Read More

Reinforcing the IoT and OT Security Space: Nozomi Networks Secures $100M Investment, Supported by Huge Investors

By: Alex Passett    3/18/2024

Nozomi Networks recently announced its successful $100 million Series E funding round to support critical IoT and OT security measures. Mitsubishi Ele…

Read More

Global IoT eSIM and iSIM Connections to Grow by '208% by 2028,' per Juniper Research

By: Alex Passett    3/15/2024

Analysts at Juniper Research have reported new eSIM and iSIM market data relevant for IoT developers, telcos and more.

Read More

Keysight Technologies Becomes New Test Partner for the Deutsche Telekom Satellite NB-IoT Early Adopter Program

By: Alex Passett    3/12/2024

As the new Test Partner for Deutsche Telekom's Satellite NB-IoT Early Adopter Program, Keysight Technologies Inc. will accelerate the development and …

Read More