Menu

IoT FEATURE NEWS

Security Solution from Secret Double Octopus Goes Beyond Encryption

By Ken Briodagh November 24, 2015

Security is critical, especially if the IoT is to advance into full enterprise adoption and consumer trust circles. Well, encryption is one of the pathways to get there, and now Secret Double Octopus, a provider of keyless secure communications, has announced a solution that is designed to secure network traffic and authentication beyond the limitations of PKI, SSL and VPN.

Secret Double Octopus (What a name!) helps site-to-site, site-to-cloud, mobile and IoT initiatives overcome the vulnerabilities of most encryption protocols by using secret sharing, which eliminates the need for cryptographic keys and provides protection that experts have postulated as unbreakable.

Hackers are becoming more nimble and accessing ever growing computing power, while IoT and mobile exponentially increase endpoints beyond what can practically be secured with traditional protocols, such as PKI and certificate authorities.

“As hackers become more agile and gain access to increased computing power, the threat of key related exploits becomes even more prevalent,” said Tony Velleca, CIO, UST-Global. “The approach taken by Secret Double Octopus goes beyond traditional encryption and is strongly aligned with our vision for next generation security.”

Image via Pixabay

Secret Double Octopus is the first company to use secret sharing to build a network-focused security solution. This enables organizations to keep network traffic and authentication information-theoretically secure. Data is represented by random bits across multiple routes that only when assembled at its destination can be interpreted, hardening communications as a result.

“Well-publicized data breaches and security hacks underscore the need to more effectively secure critical networks,” said Raz Rafaeli, CEO, Secret Double Octopus. “By utilizing secret sharing, we’ve taken a new approach to security that eliminates the encryption key, an exploited single point of failure in today’s security paradigm.”

I say, let’s let the Octopus out of the bag. 




Edited by Kyle Piscioniere

Editorial Director

SHARE THIS ARTICLE
Related Articles

Qualcomm, China Mobile Research Institute and Mobike to Commence LTE IoT Multimode Field Trials

By: Ken Briodagh    5/23/2017

According to a recent announcement, Qualcomm plans to commence the first eMTC/NB-IoT/GSM (LTE Cat M1/NB1 and E-GPRS) multimode field trials in China, …

Read More

New Cisco Survey Indicates That Most IoT Projects Are Failing

By: Ken Briodagh    5/23/2017

A new study conducted by Cisco seems to indicate that 60 percent of IoT initiatives stall at the Proof of Concept (PoC) stage and only 26 percent of c…

Read More

IoT Time Podcast S.2 Ep.28 DMI

By: Ken Briodagh    5/23/2017

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Magnus Jern, Chief Innovation Officer, DMI.

Read More

Qualcomm Offers $11.0 Billion in Senior Notes to Finance NXP Acquisition

By: Ken Briodagh    5/22/2017

Qualcomm Incorporated has announced that it has priced a public offering of senior unsecured notes in a combined aggregate principal amount of $11.0 b…

Read More

5G Might Not Be The Next Big Thing for IoT, Study Says

By: Ken Briodagh    5/22/2017

Mobile Experts releases network and handset cost estimates for 5G, illustrates the weaknesses of 5G, especially for IoT.

Read More