I remember seeing a comedian do a bit about “why do brand marketers use words like ‘New and Improved’ on products?” The punch line boiled down to: the only thing “new and improved” is the way you’re talking about the product and maybe a feature you bolted on to the old one you’re imploring us to replace.
These days I feel the same about the over-use of “next-gen” on just about every tech product, advancement and feature. Especially with all-things-AI. And even closer to home, especially with identity and access management solutions. It seems as though you can’t go anywhere without running into a “next-gen” solution!
Before diving into what next-Gen MFA is, it’s important to understand what it isn’t. Next-gen MFA is Often Confused With:
I can’t control what other cyber defense solution manufacturers consider to be “Next-Gen,” but I can affect what it means at SOFTwarfare.
True next-gen MFA moves beyond the limitations of traditional multi-factor authentication. For SOFTwarfare, this means:
Integrated, Continuous Contextual and Adaptive Authentication:
Instead of just asking for a second factor every time, our approach is to analyze the context of the login attempt. This includes:
Phishing-Resistant Authentication: Next-gen MFA prioritizes methods that are highly resistant to phishing attacks. This often means moving beyond OTPs (one-time passwords) delivered via SMS or email that can be intercepted. Instead, it emphasizes:
Enhanced User Experience: While security is paramount, next-gen MFA aims to minimize friction for the user. This means:
Centralized Management and Orchestration: Our secured, integrated platform as a service provides a centralized capability for managing authentication policies, integrating with various applications and services, and providing detailed reporting and analytics.
When I was in the Army, I had the privilege of leading Information Operations campaigns across the globe. One of my constant mantras was that Words Matter. Next-gen MFA is a paradigm shift in how we think about authentication. It's not just about adding more factors; it's about adding intelligence to the authentication process. It's about understanding the context of each login attempt and dynamically adjusting the level of security required. It's about prioritizing phishing-resistant methods and minimizing user friction.
If a solution claims to be "next-gen" MFA, make sure it delivers on these core principles. Otherwise you might just be getting the same, tired cereal in a shiny new wrapper.