Menu

IoT FEATURE NEWS

Multi-shield User Authentication Could Eliminate Passwords, Company Says

By Ken Briodagh March 15, 2017

In a recent announcement, security company Secret Double Octopus has said that its newly launched “authenticator” app for enterprises will increase enterprise-level security and streamline processes for login and authentication.

Authentication systems have traditionally relied on a single layer of protection, including SMS, tokens, push notifications and biometrics. Secret Double Octopus says its app is better because it helps enterprises to scale network security and shift options away from key-based authenticators to a keyless solution. As designed, the company the authenticator app initiates a multi-shield authentication process for users in order to verify or reject the login attempt, payment or transaction.

Based on Secret Sharing algorithms, originally developed to protect nuclear launch codes, Secret Double Octopus applies keyless authentication and data-in-motion protection for cloud, mobile, and IoT. The company's technology is designed to prevent cyber attackers from accessing enough critical information to be useful for attacks such as brute force, man-in-the-middle, PKI manipulation, key theft and certificate authority weaknesses.

According to the recently issued NIST Digital Identity guidelines draft, the use of biometrics in user identification platforms is to be accompanied by another authentication approach, and discourage the use of SMS or voice for use in the authentication process at this time.

“With NIST discouraging the use of SMS and highlighting lack of confidence in biometrics as a single factor of protection, we expect to see more organizations moving towards keyless authentications systems over the course of 2017,” said Raz Rafaeli, CEO, Secret Double Octopus. “Secret Double Octopus is leading the way in the introduction of keyless authentication platforms across enterprise companies, and is proud to now increase our ability to better protect our customers with the introduction of the first and only keyless authentication app.”




Edited by Maurice Nagle

Editorial Director

SHARE THIS ARTICLE
Related Articles

Deloitte Selects Miami Based Unified Technologies for Caribbean Cyber Security Alliance

By: Ken Briodagh    8/16/2017

Unified Technologies, an IT solutions provider with operations in the Caribbean and North America, has announced a newly established Cyber Security Al…

Read More

InfoSec Veteran Mike Ahmadi to join DigiCert as Global Director of IoT Security

By: Ken Briodagh    8/16/2017

Ahmadi brings decades of leadership and advocacy in critical infrastructure security, including active participation in several standards creation gro…

Read More

IoT Time Podcast S.2 Ep.43 Nokia

By: Ken Briodagh    8/16/2017

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Khamis Abulgubein, PLM, Emerging IoT Applications at Nokia.

Read More

To Build or To Buy: That is the Question

By: Ken Briodagh    8/15/2017

When a company seeks to implement an IoT solution, the decision of whether or not to build a custom tool or platform is no less dire. It can mean the …

Read More

Speed is King in Florida as Verizon, Ericsson and Qualcomm Approach 1G Wireless

By: Arti Loftus    8/15/2017

As we move closer to a 5G world, a new age of intelligent, connected devices is paving the way towards more reliable and faster performance.

Read More