Organizations labor to protect communications and data, but every new exploit shows that security can be a moving target. Hackers are becoming more nimble and accessing ever growing computing power. Moreover, IoT and mobile exponentially increase endpoints beyond what can practically be secured with traditional protocols, such as PKI and certificate authorities. The industry has long sought a way to get off the treadmill and find an approach that is sustainable and scalable. As hackers become more agile and gain access to increased computing power, the threat of key related exploits becomes even more prevalent
Secret Double Octopus is the first company to use secret sharing to build a network-focused security solution. This enables organizations to keep network traffic and authentication information-theoretically secure. Data is represented by random bits across multiple routes that only when assembled at its destination can be interpreted, hardening communications as a result. By utilizing secret sharing, SDO takes a new approach to security that eliminates the encryption key, an exploited single point of failure in today’s security paradigm