PAM vs User Access Security Broker – a new approach to multi-factor authentication

Secfense meta 2a

Multi-Factor Authentication

The market of MFA solutions is completely saturated with a number of solutions and vendors. Just to provide a quick example of how the situation looks like, the web portal called G2 Crowd, which focuses on collecting user reviews for business software, lists more than 140 companies that make MFA software.

When it comes to vendors, some of them focus their efforts on providing comprehensive MFA. Alternatively, there are companies that provide MFA solutions, but have a broader scope and try to offer identity services that cover the management of the whole identity lifecycle.

These Identity and Access Management (IAM) vendors are evaluated every year by Gartner in its Magic Quadrant for Access Management.

There is also a huge range of authenticators that could be used for MFA purposes, offering different assurance characteristics, as shown below.

n4NOsgfyCCUuwEsunnre2xCQrIuHGoAmixHk FVEKNwCqSb2p0WT 7mzfyuPiyxYKmvv9e2VOVlZzhrgDE
Level of Assurance Provided by Different Authentication Methods

Some of the vendors of MFA solutions, just offer one kind of authenticators (e.g. authentication keys), while other vendors offer a huge range of possibilities (e.g. email, voice call, SMS, authentication keys, mobile push notifications, etc.)

This article will analyze two other possibilities to implement MFA in an organization: Privileged Access Management (PAM) and User Access Security Broker approach.

PAM Vendors

Privilege credential solutions are used in some organizations to protect elevated access and permissions associated with certain accounts.

Generally, an organization that implements PAM uses it for authentication and access management: limit system access and also control the access of authorized users. PAM acts as an intermediary layer, in the authentication process, that allows admins to use their accounts with limited rights for the day to day activities while providing the possibility to escalate those rights whenever it is necessary to perform privilege activities. Here’s an example of a PAM solution:

Om3Y0gAjmr7vFjlo67pS lZloH6pI0kVZzw nYWwy WzPzkgmI21p CMRepA5uA 4nuaLXdyEe3IG5uUaHpmp50s WownZkbQKv191TUbKfaf3UoBrAdsdpCHLZ6ziBr5GvSjp4
Privileged Access Management

The deployment of a PAM requires the integration of new hardware and software at customer premises. The system sits in the middle of the communications between people, processes, and applications and the different resources that need to be accessed, such as servers, workstations, applications, databases, etc.

The PAM system controls the access to the end resources and will only allow the escalation of privilege to certain accounts and under certain circumstances. This kind of system enforces the use of the least privilege principle and drastically limits the attack surface for internal and external threats, at the same time that offers a centralized log repository where all the actions performed by any account in any system will get registered.

PAM solutions can be combined with MFA in order to provide an extra security layer. Even though it is not very common, PAM systems could be used to deploy MFA in certain systems with strong limitations to integrate with current MFA solution requirements.

User Access Security Broker

The concept of the user access security broker has emerged in 2018 and is on an early awareness stage. It is being tested by early adopters and is slowly getting recognition as a new, interesting alternative to traditional MFA deployment methods.

The added value of this kind of solution resides in the fact that the deployment of only one server, whether it is physical or virtualized, will reduce the number of API integration development that would be necessary for each application, as it is centralized in only one device. The term User Access Security Broker was first used by Secfense to name their approach to MFA adoption and scaling. Below there’s a solution architecture showing where the User Access Security Broker is placed in the company infrastructure.

fPakAD2MK 0RWUpf3LM 3WClKH 4tQ552qM5uK5mp8ePVVnh73wJ2nMHWoIUioh6Kj6gjwHGfiX2MSig5 grEn4cPZFvLpH2gItRkuZl rRnYvXdwZsaJNHOCwY7RjsD5vFjX9Et
The User Access Security Broker from Secfense

Secfense implementation consists in the introduction of a proxy server in the organization network that will handle user login attempts. The traffic of the organization’s network needs to be diverted to the Secfense server, as shown in Figure 10, by adding new DNS entries, firewall rules or modifying the routing table. This traffic is then inspected using machine learning techniques and when certain criteria are matched (e.g. user authentication request), a certain 2FA mechanism is activated. The introduction of this proxy into the organization centralizes the MFA processes, eliminating in this way the need to integrate the MFA applications in the network, one by one, with the MFA method of choice selected. If the user is successfully authenticated, he or she will be allowed to access the resource.

This article was based on the section of the research paper titled Multi-Factor Authentication Implementation Guidelines and Best Practices written by Jose A. Rodriguez Albala. The complete work can be found here.

Antoni takes care of all the marketing content that comes from Secfense. Read More


We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk



We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director


Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera


Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures

Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.

Dariusz Pitala

Head of IT