Menu

IoT FEATURE NEWS

Multi-shield User Authentication Could Eliminate Passwords, Company Says

By

In a recent announcement, security company Secret Double Octopus has said that its newly launched “authenticator” app for enterprises will increase enterprise-level security and streamline processes for login and authentication.

Authentication systems have traditionally relied on a single layer of protection, including SMS, tokens, push notifications and biometrics. Secret Double Octopus says its app is better because it helps enterprises to scale network security and shift options away from key-based authenticators to a keyless solution. As designed, the company the authenticator app initiates a multi-shield authentication process for users in order to verify or reject the login attempt, payment or transaction.

Based on Secret Sharing algorithms, originally developed to protect nuclear launch codes, Secret Double Octopus applies keyless authentication and data-in-motion protection for cloud, mobile, and IoT. The company's technology is designed to prevent cyber attackers from accessing enough critical information to be useful for attacks such as brute force, man-in-the-middle, PKI manipulation, key theft and certificate authority weaknesses.

According to the recently issued NIST Digital Identity guidelines draft, the use of biometrics in user identification platforms is to be accompanied by another authentication approach, and discourage the use of SMS or voice for use in the authentication process at this time.

“With NIST discouraging the use of SMS and highlighting lack of confidence in biometrics as a single factor of protection, we expect to see more organizations moving towards keyless authentications systems over the course of 2017,” said Raz Rafaeli, CEO, Secret Double Octopus. “Secret Double Octopus is leading the way in the introduction of keyless authentication platforms across enterprise companies, and is proud to now increase our ability to better protect our customers with the introduction of the first and only keyless authentication app.”




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Rising Edge Computing Investments to Reach $350B by 2027, According to IDC

By: Alex Passett    3/27/2024

Worldwide spending on edge computing is expected to surge (and then keep going) for the foreseeable future, according to the International Data Corpor…

Read More

ZEDEDA Adds Lisa Edwards as New Board Member, Seeks Opportunities to Strengthen Operations and Scale

By: Alex Passett    3/26/2024

Earlier this morning, ZEDEDA announced the addition of Lisa Edwards to its board of directors.

Read More

An Existing IoT Collab, Emboldened: Digi International and Telit Cinterion Transform Solutions with 5G RedCap Integration

By: Alex Passett    3/25/2024

The ongoing industry collaboration between Digi International and Telit Cinterion signals strong support for the mainstream showcasing of 5G for IoT a…

Read More

Telit Cinterion's 5G LGA Modules, Powered by Snapdragon from Qualcomm, to Create a Big Leap in IoT Connectivity

By: Alex Passett    3/25/2024

Telit Cinterion recently unveiled its FE990B34/40 LGA family of modules, powered by the Snapdragon X72 5G Modem-RF System from Qualcomm Technologies, …

Read More

Embracing Innovation in Mining: The Role of Network-Aware Applications in the Digital Transformation

By: Special Guest    3/21/2024

Shabodi leverages private 5G network capabilities and enables the development of network-aware applications to enhance operational efficiency, automat…

Read More