SlideShare a Scribd company logo
1 of 34
2022
Octopus
Authentication
Platform
Your Speakers Today
Amit Lavi
VP of Customer Success
Secret Double Octopus
Horacio Zambrano
Chief Marketing Officer
Secret Double Octopus
1. Market context
2. Top 5 passwordless concerns in
2022
3. Octopus Cloud
4. Q&A
Agenda
“The secret to getting ahead
is getting started”
Mark Twain
Latest Market Context
Ransomware
 CISA/FBI/NSAAdvisory (Feb 22)
 Cybercriminals increasingly gaining access to networks
via phishing, stolen RDP credentials or brute force, and
exploiting SW vulnerabilities
 14 of the 16 US critical infrastructure sectors
 # of attacks up 105% in ’21 (SonicWall)
 Data leaks due to ransomware (+82%)
in ‘21 (CrowdStrike)
 Avg ransom demand +36% to $6.1M
Attacks are up across the board
Phishing
 25% of all data breaches involve phishing / 85% have
human element (Verizon ‘21 DBIR)
 83% of orgs say they had a successful email-based phish
attack in ‘21 (vs 57% in ‘20)
 +18% change in BEC attacks, +9% in bulk phishing
attacks, +13% change in spearphishing
MFA use is up, but not universal
Source: Cisco Duo
Use MFA
In 2017
28%
Use MFA
today
78%
Where is MFA used?
Passwordless MFA is Gaining Ground
If your organization does not have passwordless authentication, would your organization adopt it in
the near future?
Passwordless for employees and/or partners
What percent of your employees do
you expect to be using passwordless
one year from now?
What percent of your employees
use passwordless today?
Top 5
Passwordless Concerns
What are my broad
MFA/passwordless
options today?
Enterprise Strong Authentication Options
Password
Rotation-based
Secret Double Octopus
Traditional
MFA
Password ”+1” Authentication
Cert-based Passwordless
Solutions
HYPR, Beyond Identity, Trusona
Passwordless
Experience
WHfB, TouchID
Achieving the “Holy Grail” of
Passwordless
 Maximum security of end users never having to remember a
password
 IT takes responsibility of authentication of the hands of the end
user
No password left behind
 Coverage for all use cases an end user encounters throughout
their hybrid work day
What do we mean by Full Passwordless?
Do I have to go
Passwordless day
one?
Passwordless is not
a one shot deal
Start with desktop
MFA & Cloud apps
Windows and Macs
Add VPN
Remote users
Add kiosks and
shared desktops
VDI and other EUM
Octopus Authentication Platform
Full Passwordless™
OCTOPUS ENTERPRISE
OCTOPUS Lite
Extend your MFA
Authentication to Desktop
OCTOPUS STARTER
Remote Worker Security
(Traditional MFA)
OCTOPUS PRO
Desktop MFA + BYOD
(Traditional MFA)
Next Gen Authentication for Workforces
THE MOST POWERFUL AUTHENTICATION PLATFORM FOR POWERING
PASSWORDLESS JOURNEY
Octopus Enterprise
Innovative Flexibility Features
"PASSWORD FREE” MODE
 User sets their password once and never has to remember it
 User retains control of password
PASSWORDLESS WITH RETRIEVAL
 User can get access to their system generated password in a pinch or when they
need it
 Stored in the secure enclave and communicated to the mobile device through our
patented Quantum Safe secret sharing communication
PASSWORDLESS WITHOUT RETRIEVAL
 User cannot see the system generated password ever
But I already have
existing IAM
Infrastructure
IDP/SSO AND POSSIBLY MFA
Deep Integration into Existing Hybrid Cloud
Environment
 EXISTING IP/SSO PORTAL OR SDOS
Okta, Ping, ForgeRock, ADFS, etc
 RADIUS OR SAML VPN SUPPORT
Unique FIDO key support for RADIUS VPNs
 BYOA & INTEGRATED OTP SUPPORT
Support for Okta Verify and ForgeRock Authenticator
Support for RSA SecureD and other OT solutions
 BROAD USER DIRECTORY SUPPORT
AD, Azure, Okta, ForgeRock, Google, etc.
Mac, Win 7 and Win 10 support
Highly reliable offline w/Octopus Authenticator
Complete support for FIDO2 keys, including
NFC and BLE
FileVault support on Mac
Passwordless Privilege User: Linux (ssh) and
Windows Server (RDP)
Desktop MFA:
Deep Support for
Mac & Win
ProductDemo
ProductDemo
What about my
legacy apps, especially
on-premise
Legacy Apps
are the #1 Inhibitor
to Passwordless
Source: Forrester, Q4 21
What is your biggest obstacle achieving passwordless for all
employees?
Source: Ponemon/Double Octopus ‘21 Study, Q3 21
Why would your organization not adopt passwordless
authentication?
Legacy Apps - Come in several sizes
Active Directory
join or not?
Beholden to the password in the user
Directory
1
SAML
enabled or not?
Capable of being federated
3
Localized DBMS
Manage their own username and
password in the application itself
2
Octopus Quick Actions are a game changer
AVAILABLE ON
WINDOWS & MAC
Native UX feel
USER SELF-SERVICE
PORTALACCESS
Rapid self-service options
INTEGRATED BLE
INTERACTIONS
Injected clipboard actions
It has to be easy to
deploy and how will it
lower my TCO for IAM
Octopus Cloud
OCTOPUS CLOUD
ENTERPRISE
OCTOPUS CLOUD
STARTER
OCTOPUS CLOUD
PRO
Making Best-in-Class
Passwordless Ultra Easy
Easy Deployment & User Onboarding
On-Premise Install System prerequisite
On-premise
Installation
service configuration
System ready for
Deployment
Cloud Install Remote AD Sync service configuration
System ready for
Deployment
User Deployment Enrollment Invitation
Enroll on mobile
app, FIDO
user's portal first
strong login
Windows/Mac login
Self Service
Email QR code sent
(Admin or Self-
service)
Mobile recovery Help-desk support
SSO-Based Admin Access to the Cloud
Octopus Cloud Back End Screen Shots
User Management on Octopus Cloud
Q&A
Thank You
For customer inquiries:
doubleoctopus.com/contact
doubleoctopus.com/request-a-demo
For channel inquiries or webinar reproduction:
marketing@doubleoctopus.com

More Related Content

Similar to Octopus Authentication Platform

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...Happiest Minds Technologies
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierCTE Solutions Inc.
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXLSectricity
 

Similar to Octopus Authentication Platform (20)

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Rebooting the smartcard
Rebooting the smartcardRebooting the smartcard
Rebooting the smartcard
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXL
 

Recently uploaded

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

Octopus Authentication Platform

  • 2. Your Speakers Today Amit Lavi VP of Customer Success Secret Double Octopus Horacio Zambrano Chief Marketing Officer Secret Double Octopus
  • 3. 1. Market context 2. Top 5 passwordless concerns in 2022 3. Octopus Cloud 4. Q&A Agenda “The secret to getting ahead is getting started” Mark Twain
  • 5. Ransomware  CISA/FBI/NSAAdvisory (Feb 22)  Cybercriminals increasingly gaining access to networks via phishing, stolen RDP credentials or brute force, and exploiting SW vulnerabilities  14 of the 16 US critical infrastructure sectors  # of attacks up 105% in ’21 (SonicWall)  Data leaks due to ransomware (+82%) in ‘21 (CrowdStrike)  Avg ransom demand +36% to $6.1M Attacks are up across the board Phishing  25% of all data breaches involve phishing / 85% have human element (Verizon ‘21 DBIR)  83% of orgs say they had a successful email-based phish attack in ‘21 (vs 57% in ‘20)  +18% change in BEC attacks, +9% in bulk phishing attacks, +13% change in spearphishing
  • 6. MFA use is up, but not universal Source: Cisco Duo Use MFA In 2017 28% Use MFA today 78% Where is MFA used?
  • 7. Passwordless MFA is Gaining Ground If your organization does not have passwordless authentication, would your organization adopt it in the near future? Passwordless for employees and/or partners What percent of your employees do you expect to be using passwordless one year from now? What percent of your employees use passwordless today?
  • 9. What are my broad MFA/passwordless options today?
  • 10. Enterprise Strong Authentication Options Password Rotation-based Secret Double Octopus Traditional MFA Password ”+1” Authentication Cert-based Passwordless Solutions HYPR, Beyond Identity, Trusona Passwordless Experience WHfB, TouchID
  • 11. Achieving the “Holy Grail” of Passwordless  Maximum security of end users never having to remember a password  IT takes responsibility of authentication of the hands of the end user No password left behind  Coverage for all use cases an end user encounters throughout their hybrid work day What do we mean by Full Passwordless?
  • 12. Do I have to go Passwordless day one?
  • 13. Passwordless is not a one shot deal Start with desktop MFA & Cloud apps Windows and Macs Add VPN Remote users Add kiosks and shared desktops VDI and other EUM
  • 14. Octopus Authentication Platform Full Passwordless™ OCTOPUS ENTERPRISE OCTOPUS Lite Extend your MFA Authentication to Desktop OCTOPUS STARTER Remote Worker Security (Traditional MFA) OCTOPUS PRO Desktop MFA + BYOD (Traditional MFA) Next Gen Authentication for Workforces THE MOST POWERFUL AUTHENTICATION PLATFORM FOR POWERING PASSWORDLESS JOURNEY
  • 15. Octopus Enterprise Innovative Flexibility Features "PASSWORD FREE” MODE  User sets their password once and never has to remember it  User retains control of password PASSWORDLESS WITH RETRIEVAL  User can get access to their system generated password in a pinch or when they need it  Stored in the secure enclave and communicated to the mobile device through our patented Quantum Safe secret sharing communication PASSWORDLESS WITHOUT RETRIEVAL  User cannot see the system generated password ever
  • 16. But I already have existing IAM Infrastructure IDP/SSO AND POSSIBLY MFA
  • 17. Deep Integration into Existing Hybrid Cloud Environment  EXISTING IP/SSO PORTAL OR SDOS Okta, Ping, ForgeRock, ADFS, etc  RADIUS OR SAML VPN SUPPORT Unique FIDO key support for RADIUS VPNs  BYOA & INTEGRATED OTP SUPPORT Support for Okta Verify and ForgeRock Authenticator Support for RSA SecureD and other OT solutions  BROAD USER DIRECTORY SUPPORT AD, Azure, Okta, ForgeRock, Google, etc.
  • 18. Mac, Win 7 and Win 10 support Highly reliable offline w/Octopus Authenticator Complete support for FIDO2 keys, including NFC and BLE FileVault support on Mac Passwordless Privilege User: Linux (ssh) and Windows Server (RDP) Desktop MFA: Deep Support for Mac & Win
  • 20.
  • 22. What about my legacy apps, especially on-premise
  • 23. Legacy Apps are the #1 Inhibitor to Passwordless Source: Forrester, Q4 21 What is your biggest obstacle achieving passwordless for all employees? Source: Ponemon/Double Octopus ‘21 Study, Q3 21 Why would your organization not adopt passwordless authentication?
  • 24. Legacy Apps - Come in several sizes Active Directory join or not? Beholden to the password in the user Directory 1 SAML enabled or not? Capable of being federated 3 Localized DBMS Manage their own username and password in the application itself 2
  • 25.
  • 26. Octopus Quick Actions are a game changer AVAILABLE ON WINDOWS & MAC Native UX feel USER SELF-SERVICE PORTALACCESS Rapid self-service options INTEGRATED BLE INTERACTIONS Injected clipboard actions
  • 27. It has to be easy to deploy and how will it lower my TCO for IAM
  • 28. Octopus Cloud OCTOPUS CLOUD ENTERPRISE OCTOPUS CLOUD STARTER OCTOPUS CLOUD PRO Making Best-in-Class Passwordless Ultra Easy
  • 29. Easy Deployment & User Onboarding On-Premise Install System prerequisite On-premise Installation service configuration System ready for Deployment Cloud Install Remote AD Sync service configuration System ready for Deployment User Deployment Enrollment Invitation Enroll on mobile app, FIDO user's portal first strong login Windows/Mac login Self Service Email QR code sent (Admin or Self- service) Mobile recovery Help-desk support
  • 30. SSO-Based Admin Access to the Cloud
  • 31. Octopus Cloud Back End Screen Shots
  • 32. User Management on Octopus Cloud
  • 33. Q&A
  • 34. Thank You For customer inquiries: doubleoctopus.com/contact doubleoctopus.com/request-a-demo For channel inquiries or webinar reproduction: marketing@doubleoctopus.com

Editor's Notes

  1. Thanks for joining us 1st webinar of the year for us
  2. Each speaker introduces themselves
  3. How we structured the presentation Provide a view of the latest Top 5 Octopus Cloud – announced in Feb, released in Jan; Amit was Product executive when that was released
  4. Ransomware CISA/FBI/NSA Advisory (Feb 22) Cybercriminals increasingly gaining access to networks via phishing, stolen RDP credentials or brute force, and exploiting SW vulnerabilities 14 of the 16 US critical infrastructure sectors # of attacks up 105% in ’21 (SonicWall) Data leaks due to ransomware (+82%) in ‘21 (CrowdStrike) Avg ransom demand +36% to $6.1M Phishing 25% of all data breaches involve phishing / 85% have human element (Verizon ‘21 DBIR) 83% of orgs say they had a successful email-based phish attack in ‘21 (vs 57% in ‘20) +18% change in BEC attacks, +9% in bulk phishing attacks, +13% change in spearphishing
  5. 78% of users now use MFA, compared to 28% in 2017 (Duo)
  6. 2. Robustness examples - Legacy application support