Zero Trust Enhanced by User Access Security Broker

Zero Trust Enhanced by User Access Security Broker

The problem with zero trust security deployment is pretty common in enterprises and large organizations. It results from big organizations’ inertia in adapting market trends and standards. In addition, it is associated with the so-called vendor lock-in in the context of already installed solutions, i.e. a situation in which the customer is dependent on the solution provider to such an extent that it is not possible to change the vendor without incurring large costs caused by the change.  

Zero Trust Security

Many years ago, critical systems that required protection against external attacks were secured in the so-called moat that clearly divided the outside world from the world inside the organizations’ secure network.  

It was undiscussed for many years new factors appeared and completely refuted the validity of this assumption. These factors were:

  • private electronic devices used by employees in the office
  • company devices carried out by employees outside the organization
  • the use of systems/applications in the SaaS model (so located physically outside of the organization)
  • and finally, remote work, which since April 2020 has become an unplanned new reality.

Due to these factors, cybersecurity strategies in large organizations with heterogeneous IT environments had to abandon the moat model and move towards “zero trust“.

The main change that came with the new model was the transfer of cybersecurity from the periphery of the organization to a more granular level, which is the user himself and the interfaces he uses.

Additionally, statistics show that in over 80% of cases of breaking into an organization’s infrastructure, identity theft plays a huge role. It is therefore a critical attack vector.

Passwordless + Secfense User Access Security Broker
Passwordless + Secfense User Access Security Broker

The key to effectively protecting your organization’s data and resources is making sure you know exactly who is on the other side of the screen. Without this certainty, nothing can ever be secure.

There are many solutions on the market that address this problem. Strong authentication methods, i.e. (2FA or MFA), or futuristic sounding passwordless, where the user will not need to use a troublesome password, but only a factor that will easily authenticate him or her.  

This direction is closely related to the new open standard of web authentication, widely used on the Internet, known as FIDO2 or Webauthn. Already today, this standard is supported in commonly used web browsers.

It is clear where the problem lies in large organizations’ cybersecurity and what is the solution. Unfortunately, the last difficulty standing in the way is the difficulty of implementing that solution.

Technology adoption is actually the biggest challenge, especially for enterprises like financial institutions that have been building their technology stack for years. These types of organizations own applications from various vendors, often written by their own programming teams, in various possible technologies.

This is where a solution like User Access Security Broker comes into play.

Security broker is a modern approach to the implementation of the zero trust methodology along with the forward-looking passwordless methods.

This solution builds a layer between the users and the applications used by the users. It is in this layer that everything related to the safe access of users to the application takes place, regardless of where they log in from.

Another advantage is the fact that the broker does not require any database or application integration and can be used regardless of the technology in which the protected application was written.

Passwordless + Secfense User Access Security Broker
Passwordless + Secfense User Access Security Broker

So the generalized formula for CISO success looks like this:  

zero trust (passwordless) + user access security broker

The CEO and co-founder, Tomasz Kowalski, has nearly 20 years of experience in the sale of IT technology, he was involved in hundreds of hardware and software implementations in large and medium-sized companies from the finance, telecommunications, industry and military sectors. Read More

Testimonials

We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk

CEO

Sandis

We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director

RKKVC

Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera

Partner

Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures

Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.

Dariusz Pitala

Head of IT

MPEC S.A.