How to Introduce Zero Trust Globally | Introduction to Passwordless Authentication Scaling

Secfense meta 2a

So-called ‘secure networks’ no longer work

The world of cybersecurity keeps chasing newer, better, and more effective ways to protect against data leaks.  The traditional model that used to focus IT security efforts on the edge of the network (the philosophy of building the so-called “castle and moat”) does not work anymore. Expenses on prevention keep increasing but at the same time, the costs of cyber ransoms and costs of fixing the damage made by attackers keep increasing as well. There’s one model though that is becoming more and more popular among cybersecurity experts. This model is called Zero Trust. But what is it and how to introduce zero trust in an organization?

Zero Trust Network Model was first mentioned in 2010 by John Kindervag.  Since then many CIOs and CISOs have introduced the Zero Trust model principles to protect their organizations globally.

What’s so special in the Zero Trust Security Approach?

The core of Zero Trust is the assumption that organizations should never automatically trust anything or anyone inside or outside the network.  Instead, they must always verify any attempts to connect to the systems before granting access to them.  The strategy around Zero Trust comes down to basically not trusting anyone.  This means cutting off all access to IP addresses, machines, systems, resources, etc., until the network knows who the user (or system) is and whether it has the appropriate permissions or not.  In other words, the Zero Trust model completely discredits the “castle and moat” philosophy, in which the organization is focused on defending the perimeter, and assumes that everything inside is safe and not subject to access control.  

IT security experts relentlessly repeat that the “castle and moat” approach does not work. They point out to the fact that most data leaks occur when a bad actor is already within the corporate network after successfully breaching a firewall. When the intruder is in he is able to navigate through internal systems without any problems.  

There are more reasons why Zero Trust has been gaining so much popularity.  Currently, in most cases, the “castle” itself does not function in isolation from the rest of the IT world. Corporate data centers do not only support closed networks, but also maintain applications in the public cloud, accessible anytime and anywhere, also from the public internet.

FAST EASY SCALABLE Enable any 2FA method on any application Protect your company employees and customers with simpler and stronger authentication. Deploy 2FA in minutes not weeks
How to introduce a zero security model in any organization

What does the Zero Trust consist of?

The Zero Trust approach builds on a variety of existing technologies and management processes to secure the organization’s IT environment.  The model uses information about users, their locations, and other related data to determine whether a user, machine, or application requesting access to a particular system or resource can be trusted.  

It uses methods and solutions such as:

  • multi-factor authentication,
  • IAM,
  • Visibility,
  • Automation and Orchestration,
  • Security Analytics,
  • Emails and Files Encryption,
  • Scoring and File System Permissions.

Zero Trust also requires that you define access management rules, such as providing users with the lowest level of privileges necessary to complete the desired task.

Network security is therefore designed from the inside (from the user level) and not from the outside (“from the castle and moat”).  

Zero Trust is not more than a security policy. It is a continuous process and way of thinking about security. It requires constant efforts to monitor, audit, and improve.

Human Factor –  the critical aspect of cybersecurity

It should not be forgotten that in the foundations of information security, the most important place is always the human being, supported by technology and processes. Lack of cybersecurity training and lack of a continuous awareness of employees about the dangers of the digital world may wipe out all efforts and waste all invested resources. The transition to the Zero Trust model should therefore be an integral part of any organization’s digital transformation strategy.  

From Zero Trust Model to Passwordless Authentication

Passwordless, the holy grail of cybersecurity. There are many roads that lead to zero trust security and passwordless authentication. One of the approaches that help companies enter the path to zero trust security is the User Access Security Broker. Secfense has designed the broker approach with one goal in mind. To offer the easiest and fastest transition from passwords, through strong authentication to fully passwordless authentication within the entire organization.

The video below shows our short showcase that we did during the Zero Trust Interactive Forum, a virtual event hosted by the CloserStill group.

The goal of the presentation was to show how to break legacy systems limitations and how to introduce zero trust globally. We also touched on the topic of passwordless authentication and explained our approach to scaling it without touching the code of the protected application.

  • Is it possible to protect legacy systems in the same way as cloud apps?
  • Can you integrate new security solutions without any software development?

Watch the video to get the answers. During this showcase, you will also:

  • See the live deployment of multi-factor authentication on a legacy system.
  • See our approach to easy and fast passwordless authentication deployment.
How to Introduce Zero Trust Globally | Introduction to Passwordless Authentication Scaling

Zero Trust & Passwordless Authentication FAQ

We dedicated a big part of our presentation to answering the most common questions that we receive from our customers. The video below will take you straight to the part where we answer the questions listed below:

  1. What distinguishes Secfense’s approach to strong authentication from other methods of implementing additional security?
  2. Does Secfense work in the SaaS model or can I run it on my network?
  3. What does the implementation of Secfense look like?
  4. If I already have second-factor authentication in place, should I still be interested in Secfense?
  5. How does Secfense store user passwords?
Zero Trust & Passwordless Authentication FAQ

Scaling the Zero Trust Model Within the Entire Organization

Everything that was shown during this demo is something that you can easily try out in your test environment. If there’s one thing we would like you to remember from this showcase it would be the SCALABILITY OF ZERO TRUST.

Our goal is to scale zero trust within the entire organization.

So if you’re struggling with unifying your security policies and you fight with a bunch of legacy apps then we really encourage you to talk to us and see if we can help.    

Antoni takes care of all the marketing content that comes from Secfense. Read More


We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk



We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director


Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera


Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures

Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.

Dariusz Pitala

Head of IT