Secret Double Octopus, a start-up based in Israel, emerged from stealth mode with a solution that secures network traffic and authentication beyond the limitations of PKI, SSL and VPN.
Secret Double Octopus helps site-to-site, site-to-cloud, mobile and IoT initiatives overcome the security vulnerabilities of today’s encryption protocols. The approach employs secret sharing, eliminating the need for cryptographic keys and providing protection that information theory has postulated as unbreakable.
Secret Double Octopus said it is the first company to use secret sharing to build a network-focused security solution. This enables organizations to keep network traffic and authentication information-theoretically secure. Data is represented by random bits across multiple routes that only when assembled at its destination can be interpreted, hardening communications as a result.
The intellectual property that powers the company’s solutions is based on research conducted at Ben-Gurion University by Prof. Shlomi Dolev, the company's CSO, and Dr. Shimrit Tzur-David, CTO.
“Well-publicized data breaches and security hacks underscore the need to more effectively secure critical networks,” said Raz Rafaeli, Chief Executive Officer at Secret Double Octopus. “By utilizing secret sharing, we’ve taken a new approach to security that eliminates the encryption key, an exploited single point of failure in today’s security paradigm.”
http://www.doubleoctopus.com