infoTECH Feature

November 23, 2015

Secret Double Octopus Offers New Network-Level Security Solution

Secret Double Octopus has come up with a new way to secure communications that goes beyond the power of encryption: network-level security.

The company, well-known for helping organizations achieve site-to-site, site-to-cloud, mobile, and Internet of Things (IoT) security, is offering a new security approach that involves secret sharing. The service eliminates the need for cryptographic keys and provides protection that, on paper, is “unbreakable.”

The solution is offered as a response to the “moving target” problem in data security. As long as there are codes, there will be codebreakers, and the reality is that encryption is a very sophisticated code. Organizations need a way to combat the constant threat of tireless hackers who routinely search out exploits in even the most sophisticated algorithms.

“As hackers become more agile and gain access to increased computing power, the threat of key related exploits becomes even more prevalent,” says Tony Velleca, Chief Information Officer at UST-Global. “The approach taken by Secret Double Octopus goes beyond traditional encryption and is strongly aligned with our vision for next generation security.”

Secret Double Octopus is a pioneer in the secret sharing effort to produce a network-focused security solution. The process involves transmitting data as random bits across multiple network routes. The data can only be interpreted when it’s assembled at its destination, providing a layer of security to the communications channel itself.

“Well-publicized data breaches and security hacks underscore the need to more effectively secure critical networks,” says Raz Rafaeli, Chief Executive Officer at Secret Double Octopus. “By utilizing secret sharing, we’ve taken a new approach to security that eliminates the encryption key, an exploited single point of failure in today’s security paradigm.”

Yoav Tzruya is a partner at JVP. He points out that secret sharing goes beyond the level of security provided by a public key infrastructure (PKI) solution.

"Secret Double Octopus addresses shortcomings that have plagued the epicenter of cyber security - protecting data through PKI, and specifically data in transit and PKI based authentication," he says. "Leveraging proven approaches, the company does away with all ailments of PKI while providing secure communication compatible with all current products and networks."

The company claims that its leadership team has more than a century of combined academic and professional experience that spans information security, computer science, and networking. It’s that expertise that’s the ingenuity behind the secret sharing solution.




Edited by Kyle Piscioniere
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers