Zero-Trust Identity

Passwordless Federated SSO & PKI Automation – Soliton

Passwordless Authentication

Federated SSO (SAML / OIDC)

Automated Certificate Lifecycle Management

Zero-Trust Architecture & Integration

Passwords are the problem. We provide the solution.

‍Every day
, 3.4 billion phishing emails are sent worldwide. According to the 2025 Verizon Data Breach Investigations Report, 22% of all data breaches begin with stolen or compromised credentials. This is the most common single attack vector of all. For attacks on web applications, this figure rises to as high as 88%. The conclusion is clear: as long as passwords exist, they are the weakest link in your security chain.

SecureComply implements zero-trust identity solutions from Soliton Systems, the Japanese specialist in certificate-based authentication and modern network access. The principle behind this is straightforward: no trust without verification, no access without proven device integrity and user identity.

‍Passwordless and phishing-resistant

With Certificate-Based Authentication (CBA) based on X.509 certificates and FIDO2, we completely eliminate passwords as a vulnerability. Soliton OneGate replaces the password in the login process with cryptographically strong certificates in combination with a second factor such as FIDO2 or an authenticator app. The result is an authentication method that is immune to phishing, credential stuffing, and man-in-the-middle attacks. The solution complies with NIS2 Art. 21(2)(j) as well as FINMA’s requirements for strong authentication.

Federated SSO without compromise

‍Unified
login for cloud services such as Microsoft 365, Entra ID, and Salesforce, as well as for legacy systems, without any modifications to existing applications. Your users log in once and have access to everything they need. Your IT department retains full control and visibility over every access process.

Device Trust for SASE environments

OneGate (Cloud PKI) and NetAttest EPS (On-Premise Enforcer) ensure that only managed and trusted devices gain access to your network. NetAttest EPS combines RADIUS, Private Certificate Authority, OTP, and 2FA in a single appliance and protects wired connections, Wi-Fi, and VPNs alike. This also works in hybrid environments with Cato, Zscaler, or Palo Alto Prisma Access without requiring the replacement of existing infrastructure.

Secure and compliant BYOD

Personal devices on the corporate network are a reality. The question is not if, but how secure. With the Soliton Secure Suite, corporate data on personal devices is isolated in an encrypted container consisting of Secure Workspace, Secure Browser, and MailZen for mobile devices. No MDM, no VDI, no risk of data leaks. Certificate management is handled directly by end users via the Soliton KeyManager app in three steps, without any involvement from the IT department.

The difference in numbers

In 2024, 2.8 billion passwords were offered for sale on darknet markets. Each one is a potential entry point into your company. With a passwordless architecture from Soliton Systems, there is simply nothing left to steal.

White Papers & Publications on This Topic

White Paper

Zero Trust Identity Security for Businesses: Passwordless Authentication with PKI, mTLS, and Federated SSO

How Soliton OneGate and NetAttest EPS eliminate password-based risks. From network security (IEEE 802.1X) to cloud SSO (SAML/OIDC). With automated certificate lifecycle management, SASE integration, and verifiable compliance with NIS2, GDPR, and ISO 27001.

Download

Our Other Services & Solutions

IT, Product, and OT Security from a Single Source

Product, IT, and OT Security - Comprehensive Security Consulting

  • Security Assessments & Gap Analyses
  • Strategy Development & Security Roadmaps
  • IT/OT Convergence & Industrial Security (IEC 62443)
  • vCISO Engagements & Project Support
Learn more

IT/OT Risk Analysis at the Board of Directors Level

Managing cyber risks at the board level

  • Initial assessment in accordance with ISO 27005
  • Semi-annual reassessment
  • VR-compatible reports in business language
  • Compliance: OR 716a, nDSG, FINMA
Learn more

Identify attack vectors before attackers exploit them – XM Cyber

Continuous Exposure Management

  • Continuous attack simulation
  • Attack Path Management
  • Prioritized recommendations for action
  • Integration with existing security tools
Learn more

Stefan Hungerbühler

CEO of SecureComply GmbH

Expertise on an equal footing
Do you have any questions?

In today’s ever-changing threat landscape, taking a proactive approach is crucial. We’ll show you how to use Continuous Exposure Management and Attack Path Management to close security gaps before they can be exploited, and how to seamlessly integrate these solutions into your existing infrastructure.

Stefan Hungerbühler

CEO of SecureComply GmbH

SecureComply GmbH

‍Islerenweg 5a
8708 Männedorf

info@securecomply.ch
+41 79 746 35 88

© SecureComply, LLC