SlideShare a Scribd company logo
2022
Octopus
Authentication
Platform
Your Speakers Today
Amit Lavi
VP of Customer Success
Secret Double Octopus
Horacio Zambrano
Chief Marketing Officer
Secret Double Octopus
1. Market context
2. Top 5 passwordless concerns in
2022
3. Octopus Cloud
4. Q&A
Agenda
“The secret to getting ahead
is getting started”
Mark Twain
Latest Market Context
Ransomware
 CISA/FBI/NSAAdvisory (Feb 22)
 Cybercriminals increasingly gaining access to networks
via phishing, stolen RDP credentials or brute force, and
exploiting SW vulnerabilities
 14 of the 16 US critical infrastructure sectors
 # of attacks up 105% in ’21 (SonicWall)
 Data leaks due to ransomware (+82%)
in ‘21 (CrowdStrike)
 Avg ransom demand +36% to $6.1M
Attacks are up across the board
Phishing
 25% of all data breaches involve phishing / 85% have
human element (Verizon ‘21 DBIR)
 83% of orgs say they had a successful email-based phish
attack in ‘21 (vs 57% in ‘20)
 +18% change in BEC attacks, +9% in bulk phishing
attacks, +13% change in spearphishing
MFA use is up, but not universal
Source: Cisco Duo
Use MFA
In 2017
28%
Use MFA
today
78%
Where is MFA used?
Passwordless MFA is Gaining Ground
If your organization does not have passwordless authentication, would your organization adopt it in
the near future?
Passwordless for employees and/or partners
What percent of your employees do
you expect to be using passwordless
one year from now?
What percent of your employees
use passwordless today?
Top 5
Passwordless Concerns
What are my broad
MFA/passwordless
options today?
Enterprise Strong Authentication Options
Password
Rotation-based
Secret Double Octopus
Traditional
MFA
Password ”+1” Authentication
Cert-based Passwordless
Solutions
HYPR, Beyond Identity, Trusona
Passwordless
Experience
WHfB, TouchID
Achieving the “Holy Grail” of
Passwordless
 Maximum security of end users never having to remember a
password
 IT takes responsibility of authentication of the hands of the end
user
No password left behind
 Coverage for all use cases an end user encounters throughout
their hybrid work day
What do we mean by Full Passwordless?
Do I have to go
Passwordless day
one?
Passwordless is not
a one shot deal
Start with desktop
MFA & Cloud apps
Windows and Macs
Add VPN
Remote users
Add kiosks and
shared desktops
VDI and other EUM
Octopus Authentication Platform
Full Passwordless™
OCTOPUS ENTERPRISE
OCTOPUS Lite
Extend your MFA
Authentication to Desktop
OCTOPUS STARTER
Remote Worker Security
(Traditional MFA)
OCTOPUS PRO
Desktop MFA + BYOD
(Traditional MFA)
Next Gen Authentication for Workforces
THE MOST POWERFUL AUTHENTICATION PLATFORM FOR POWERING
PASSWORDLESS JOURNEY
Octopus Enterprise
Innovative Flexibility Features
"PASSWORD FREE” MODE
 User sets their password once and never has to remember it
 User retains control of password
PASSWORDLESS WITH RETRIEVAL
 User can get access to their system generated password in a pinch or when they
need it
 Stored in the secure enclave and communicated to the mobile device through our
patented Quantum Safe secret sharing communication
PASSWORDLESS WITHOUT RETRIEVAL
 User cannot see the system generated password ever
But I already have
existing IAM
Infrastructure
IDP/SSO AND POSSIBLY MFA
Deep Integration into Existing Hybrid Cloud
Environment
 EXISTING IP/SSO PORTAL OR SDOS
Okta, Ping, ForgeRock, ADFS, etc
 RADIUS OR SAML VPN SUPPORT
Unique FIDO key support for RADIUS VPNs
 BYOA & INTEGRATED OTP SUPPORT
Support for Okta Verify and ForgeRock Authenticator
Support for RSA SecureD and other OT solutions
 BROAD USER DIRECTORY SUPPORT
AD, Azure, Okta, ForgeRock, Google, etc.
Mac, Win 7 and Win 10 support
Highly reliable offline w/Octopus Authenticator
Complete support for FIDO2 keys, including
NFC and BLE
FileVault support on Mac
Passwordless Privilege User: Linux (ssh) and
Windows Server (RDP)
Desktop MFA:
Deep Support for
Mac & Win
ProductDemo
ProductDemo
What about my
legacy apps, especially
on-premise
Legacy Apps
are the #1 Inhibitor
to Passwordless
Source: Forrester, Q4 21
What is your biggest obstacle achieving passwordless for all
employees?
Source: Ponemon/Double Octopus ‘21 Study, Q3 21
Why would your organization not adopt passwordless
authentication?
Legacy Apps - Come in several sizes
Active Directory
join or not?
Beholden to the password in the user
Directory
1
SAML
enabled or not?
Capable of being federated
3
Localized DBMS
Manage their own username and
password in the application itself
2
Octopus Quick Actions are a game changer
AVAILABLE ON
WINDOWS & MAC
Native UX feel
USER SELF-SERVICE
PORTALACCESS
Rapid self-service options
INTEGRATED BLE
INTERACTIONS
Injected clipboard actions
It has to be easy to
deploy and how will it
lower my TCO for IAM
Octopus Cloud
OCTOPUS CLOUD
ENTERPRISE
OCTOPUS CLOUD
STARTER
OCTOPUS CLOUD
PRO
Making Best-in-Class
Passwordless Ultra Easy
Easy Deployment & User Onboarding
On-Premise Install System prerequisite
On-premise
Installation
service configuration
System ready for
Deployment
Cloud Install Remote AD Sync service configuration
System ready for
Deployment
User Deployment Enrollment Invitation
Enroll on mobile
app, FIDO
user's portal first
strong login
Windows/Mac login
Self Service
Email QR code sent
(Admin or Self-
service)
Mobile recovery Help-desk support
SSO-Based Admin Access to the Cloud
Octopus Cloud Back End Screen Shots
User Management on Octopus Cloud
Q&A
Thank You
For customer inquiries:
doubleoctopus.com/contact
doubleoctopus.com/request-a-demo
For channel inquiries or webinar reproduction:
marketing@doubleoctopus.com

More Related Content

Similar to Octopus Authentication Platform

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
Microsoft Ideas
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
BHack Conference
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
JumpCloud
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension Inc.
 
Rebooting the smartcard
Rebooting the smartcardRebooting the smartcard
Rebooting the smartcard
Eric Larcheveque
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
OneLogin
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
David Waugh
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
CTE Solutions Inc.
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
Mark Gibson
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXL
Sectricity
 

Similar to Octopus Authentication Platform (20)

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Rebooting the smartcard
Rebooting the smartcardRebooting the smartcard
Rebooting the smartcard
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXL
 

Recently uploaded

LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 

Recently uploaded (20)

LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 

Octopus Authentication Platform

  • 2. Your Speakers Today Amit Lavi VP of Customer Success Secret Double Octopus Horacio Zambrano Chief Marketing Officer Secret Double Octopus
  • 3. 1. Market context 2. Top 5 passwordless concerns in 2022 3. Octopus Cloud 4. Q&A Agenda “The secret to getting ahead is getting started” Mark Twain
  • 5. Ransomware  CISA/FBI/NSAAdvisory (Feb 22)  Cybercriminals increasingly gaining access to networks via phishing, stolen RDP credentials or brute force, and exploiting SW vulnerabilities  14 of the 16 US critical infrastructure sectors  # of attacks up 105% in ’21 (SonicWall)  Data leaks due to ransomware (+82%) in ‘21 (CrowdStrike)  Avg ransom demand +36% to $6.1M Attacks are up across the board Phishing  25% of all data breaches involve phishing / 85% have human element (Verizon ‘21 DBIR)  83% of orgs say they had a successful email-based phish attack in ‘21 (vs 57% in ‘20)  +18% change in BEC attacks, +9% in bulk phishing attacks, +13% change in spearphishing
  • 6. MFA use is up, but not universal Source: Cisco Duo Use MFA In 2017 28% Use MFA today 78% Where is MFA used?
  • 7. Passwordless MFA is Gaining Ground If your organization does not have passwordless authentication, would your organization adopt it in the near future? Passwordless for employees and/or partners What percent of your employees do you expect to be using passwordless one year from now? What percent of your employees use passwordless today?
  • 9. What are my broad MFA/passwordless options today?
  • 10. Enterprise Strong Authentication Options Password Rotation-based Secret Double Octopus Traditional MFA Password ”+1” Authentication Cert-based Passwordless Solutions HYPR, Beyond Identity, Trusona Passwordless Experience WHfB, TouchID
  • 11. Achieving the “Holy Grail” of Passwordless  Maximum security of end users never having to remember a password  IT takes responsibility of authentication of the hands of the end user No password left behind  Coverage for all use cases an end user encounters throughout their hybrid work day What do we mean by Full Passwordless?
  • 12. Do I have to go Passwordless day one?
  • 13. Passwordless is not a one shot deal Start with desktop MFA & Cloud apps Windows and Macs Add VPN Remote users Add kiosks and shared desktops VDI and other EUM
  • 14. Octopus Authentication Platform Full Passwordless™ OCTOPUS ENTERPRISE OCTOPUS Lite Extend your MFA Authentication to Desktop OCTOPUS STARTER Remote Worker Security (Traditional MFA) OCTOPUS PRO Desktop MFA + BYOD (Traditional MFA) Next Gen Authentication for Workforces THE MOST POWERFUL AUTHENTICATION PLATFORM FOR POWERING PASSWORDLESS JOURNEY
  • 15. Octopus Enterprise Innovative Flexibility Features "PASSWORD FREE” MODE  User sets their password once and never has to remember it  User retains control of password PASSWORDLESS WITH RETRIEVAL  User can get access to their system generated password in a pinch or when they need it  Stored in the secure enclave and communicated to the mobile device through our patented Quantum Safe secret sharing communication PASSWORDLESS WITHOUT RETRIEVAL  User cannot see the system generated password ever
  • 16. But I already have existing IAM Infrastructure IDP/SSO AND POSSIBLY MFA
  • 17. Deep Integration into Existing Hybrid Cloud Environment  EXISTING IP/SSO PORTAL OR SDOS Okta, Ping, ForgeRock, ADFS, etc  RADIUS OR SAML VPN SUPPORT Unique FIDO key support for RADIUS VPNs  BYOA & INTEGRATED OTP SUPPORT Support for Okta Verify and ForgeRock Authenticator Support for RSA SecureD and other OT solutions  BROAD USER DIRECTORY SUPPORT AD, Azure, Okta, ForgeRock, Google, etc.
  • 18. Mac, Win 7 and Win 10 support Highly reliable offline w/Octopus Authenticator Complete support for FIDO2 keys, including NFC and BLE FileVault support on Mac Passwordless Privilege User: Linux (ssh) and Windows Server (RDP) Desktop MFA: Deep Support for Mac & Win
  • 20.
  • 22. What about my legacy apps, especially on-premise
  • 23. Legacy Apps are the #1 Inhibitor to Passwordless Source: Forrester, Q4 21 What is your biggest obstacle achieving passwordless for all employees? Source: Ponemon/Double Octopus ‘21 Study, Q3 21 Why would your organization not adopt passwordless authentication?
  • 24. Legacy Apps - Come in several sizes Active Directory join or not? Beholden to the password in the user Directory 1 SAML enabled or not? Capable of being federated 3 Localized DBMS Manage their own username and password in the application itself 2
  • 25.
  • 26. Octopus Quick Actions are a game changer AVAILABLE ON WINDOWS & MAC Native UX feel USER SELF-SERVICE PORTALACCESS Rapid self-service options INTEGRATED BLE INTERACTIONS Injected clipboard actions
  • 27. It has to be easy to deploy and how will it lower my TCO for IAM
  • 28. Octopus Cloud OCTOPUS CLOUD ENTERPRISE OCTOPUS CLOUD STARTER OCTOPUS CLOUD PRO Making Best-in-Class Passwordless Ultra Easy
  • 29. Easy Deployment & User Onboarding On-Premise Install System prerequisite On-premise Installation service configuration System ready for Deployment Cloud Install Remote AD Sync service configuration System ready for Deployment User Deployment Enrollment Invitation Enroll on mobile app, FIDO user's portal first strong login Windows/Mac login Self Service Email QR code sent (Admin or Self- service) Mobile recovery Help-desk support
  • 30. SSO-Based Admin Access to the Cloud
  • 31. Octopus Cloud Back End Screen Shots
  • 32. User Management on Octopus Cloud
  • 33. Q&A
  • 34. Thank You For customer inquiries: doubleoctopus.com/contact doubleoctopus.com/request-a-demo For channel inquiries or webinar reproduction: marketing@doubleoctopus.com

Editor's Notes

  1. Thanks for joining us 1st webinar of the year for us
  2. Each speaker introduces themselves
  3. How we structured the presentation Provide a view of the latest Top 5 Octopus Cloud – announced in Feb, released in Jan; Amit was Product executive when that was released
  4. Ransomware CISA/FBI/NSA Advisory (Feb 22) Cybercriminals increasingly gaining access to networks via phishing, stolen RDP credentials or brute force, and exploiting SW vulnerabilities 14 of the 16 US critical infrastructure sectors # of attacks up 105% in ’21 (SonicWall) Data leaks due to ransomware (+82%) in ‘21 (CrowdStrike) Avg ransom demand +36% to $6.1M Phishing 25% of all data breaches involve phishing / 85% have human element (Verizon ‘21 DBIR) 83% of orgs say they had a successful email-based phish attack in ‘21 (vs 57% in ‘20) +18% change in BEC attacks, +9% in bulk phishing attacks, +13% change in spearphishing
  5. 78% of users now use MFA, compared to 28% in 2017 (Duo)
  6. 2. Robustness examples - Legacy application support