Skip to content

Commit 05d36ea

Browse files
authored
Merge pull request #122 from DefGuard/blog/mfa-isnt-an-addon
Blog/mfa isnt an addon
2 parents 27c20a3 + 47e1c9a commit 05d36ea

File tree

4 files changed

+201
-0
lines changed

4 files changed

+201
-0
lines changed
91 KB
Loading
17.4 KB
Loading
2.31 MB
Loading
Lines changed: 201 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,201 @@
1+
---
2+
title: "Security shouldn't cost extra — MFA isn't an add-on"
3+
publishDate: 2025-11-05
4+
description: "MFA is mandatory under frameworks like NIS2. See why legacy VPNs sell it as an add-on, how that creates cost and risk, and how Defguard builds it in by default."
5+
author: "Robert (Co-Founder, Defguard)"
6+
image: "/images/blog/mfa-isnt-an-addon/mfa-hero.png"
7+
---
8+
9+
![Security shouldn't cost extra — MFA isn't an add-on](/images/blog/mfa-isnt-an-addon/mfa-hero.png)
10+
11+
## Table of Contents
12+
- [The Hidden "Security Tax": The True Cost of a Fragmented Model](#the-hidden-security-tax-the-true-cost-of-a-fragmented-model)
13+
- [Security by Design: The FortiToken Alternative](#security-by-design-the-fortitoken-alternative)
14+
- [Defguard in Practice: The Prusa Research Case](#defguard-in-practice-the-prusa-research-case)
15+
- [The Real Choice: A Fragmented Model vs. A Unified Foundation](#the-real-choice-a-fragmented-model-vs-a-unified-foundation)
16+
- [Frequently Asked Questions (FAQ)](#frequently-asked-questions-faq)
17+
18+
To comply with standards like [NIS2](/blog/mfa-wireguard-nis2-compliance), Multi-Factor Authentication (MFA) has become a baseline requirement, not an option.
19+
20+
Yet in most enterprise VPNs, fundamentals such as MFA, SSO, and identity management are still treated as extras; not for technical reasons, but because separating them is profitable.
21+
22+
The result is predictable: organizations end up buying their security in fragments just to meet compliance. This leads to increased Total Operating Costs and time lost on stitching MFA and VPN together.
23+
24+
The problem isn't technical; it's commercial. Vendors have learned to turn essential protection into a series of recurring upgrades.
25+
26+
This article breaks down how that model works — and how Defguard was designed to solve it.
27+
28+
## The Hidden "Security Tax": The True Cost of a Fragmented Model
29+
30+
When basic security requirement is sold as a separate product, expenses rise fast — not just in licensing, but in complexity and risk.
31+
32+
### 1. The Licensing Cost
33+
34+
The "security tax" is unpredictable. The appliance price looks reasonable, but then you must add per-user MFA tokens and SSO or identity module licenses. The cost keeps scaling with your headcount, not your security.
35+
36+
### 2. The Operational Cost
37+
38+
This is the pain system admins feel. Every add-on, like separate MFA modules or token licenses, adds more components to configure, maintain, and update. Each new piece introduces another integration point, another dependency, and another potential failure.
39+
40+
**Our Fix:**
41+
42+
Defguard runs as a single, unified platform, ready to deploy in minutes and built to integrate with your existing environment.
43+
44+
From one admin panel, you can manage users, groups, devices, and MFA settings, define access policies, and monitor connections, all without switching between tools.
45+
46+
![Defguard Admin Dashboard — users, groups, devices, MFA settings, and access policies overview](/images/blog/mfa-isnt-an-addon/defguard-acl-overview.png)
47+
*All security layers in one place — users, devices, MFA policies, and access rules.*
48+
49+
### 3. When Security Becomes Optional
50+
51+
The real risk? Because MFA is a separate purchase, some departments may skip it to save budget. That creates inconsistent protection — the exact kind of compliance gap auditors find and attackers exploit.
52+
53+
**Our Fix:**
54+
55+
In Defguard, MFA isn't a license you can skip, it's part of the core platform. You cannot have a compliance gap when the secure baseline is the only baseline.
56+
## Security by Design: The FortiToken Alternative
57+
58+
We believe the legacy model is broken. Security isn't something you add — it's something you build on.
59+
60+
A modern VPN shouldn't upsell you MFA; it should deliver it by design. That's the principle behind Defguard.
61+
62+
### How We Do It: A Unified Platform
63+
64+
Defguard is a self-hosted, unified solution where identity and access control are part of the same architecture. Here's what that means in practice:
65+
66+
#### 1. Built-in User Management (IdP)
67+
68+
Defguard includes a native user database — often referred to as an Identity Provider (IdP) — as a core service. It lets you manage users and groups directly, without premium extensions or add-ons, and can act as an [SSO provider](https://docs.defguard.net/features/openid-connect) for your organization.
69+
70+
#### 2. Built-in Multi-Factor Authentication (MFA)
71+
72+
Defguard also handles MFA as a core service, supporting standard time-based one-time passwords (TOTP) from authenticator apps such as Google Authenticator or Microsoft Authenticator — no proprietary tokens required. You can [explore Defguard's built-in MFA](https://defguard.net/vpn_mfa/) to see how it integrates seamlessly into your existing security environment.
73+
74+
#### 3. Integration with Your Existing Tools
75+
76+
Defguard natively integrates with identity systems like Microsoft Entra ID, Google Workspace, Okta, and JumpCloud using the standard [OpenID Connect (OIDC) protocol](https://docs.defguard.net/features/external-openid-providers). This allows users to log in with their existing accounts while keeping authentication consistent and secure across your entire infrastructure.
77+
78+
![Defguard unified architecture — distributed locations overview](/images/blog/mfa-isnt-an-addon/defguard-prusa-location.png)
79+
*Unified architecture — one core, one proxy, multiple locations.*
80+
81+
### The Proof: It's in Our Open Source Plan
82+
83+
These security capabilities are not tiered upsells. The ultimate proof is in our design: [our Open Source plan](https://defguard.net/pricing/) includes both the built-in user database (IdP) and connection-level MFA from the start.
84+
85+
This is the difference between a system built for monetization and one built for security — where essential protection is always included, and scale comes from context, not paywalls.
86+
87+
## Defguard in Practice: The Prusa Research Case
88+
89+
This isn't theoretical. **[Prusa Research](https://defguard.net/blog/prusa-vpn-scaling-with-defguard/)** needed to scale their VPN for over 500 users, including production-floor devices and remote employees.
90+
91+
A fragmented model would have forced them to manage hundreds of separate token licenses and deal with complex identity integrations. This was not a scalable or efficient solution.
92+
93+
**How we solved their problem:**
94+
95+
They chose Defguard because it's a single, unified platform. Because MFA is built-in, there are no token licenses to manage. Their IT team can provision a new user with MFA enabled in seconds, all from one place. When a user connects, Defguard enforces MFA as part of the connection process itself.
96+
97+
**The outcome is simple:**
98+
99+
100% of their VPN users have MFA enabled, because MFA isn't a license you can skip, it's part of the core platform.
100+
## The Real Choice: A Fragmented Model vs. A Unified Foundation
101+
102+
The problem with the legacy model is clear: you are forced to pay an enormous extra cost for MFA just to be compliant. This isn't an accident. It's the result of a business model designed to sell you security in separate, expensive pieces. Legacy VPNs treat security as a catalog of features; Defguard treats it as a foundation.
103+
104+
If you're facing another license renewal and see a "security tax" on your invoice, maybe it's time to move from a fragmented solution to a foundational one.
105+
106+
**See what built-in security looks like.**
107+
108+
[Book a Demo](/book-a-demo/) and explore Defguard's modern VPN with MFA included.
109+
## Frequently Asked Questions (FAQ)
110+
111+
### How much does Fortinet MFA cost?
112+
113+
Fortinet's MFA isn't a single price. It often requires separate purchases like FortiToken (for MFA) and FortiAuthenticator (for identity).
114+
115+
These components are necessary for compliance and make the true TCO much higher than the base price.
116+
117+
### Is FortiToken required for Fortinet VPN MFA?
118+
119+
Yes. In most FortiGate VPN configurations, FortiToken is the required component to enable MFA — as hardware or mobile tokens, licensed per user.
120+
121+
### What is a good FortiToken alternative?
122+
123+
A modern alternative to token-based MFA systems. Defguard includes Multi-Factor Authentication as a built-in feature — supporting standard TOTP codes from authenticator apps (like Google Authenticator) and a native user database (IdP) in every deployment. [Learn more about Defguard VPN with built-in MFA](https://docs.defguard.net/features/wireguard/multi-factor-authentication-mfa-2fa).
124+
125+
### Are there VPNs with MFA included in the base price?
126+
127+
Yes. Defguard, as a modern WireGuard®-based platform, includes MFA by default — built into every deployment, with no extra licensing or modules.
128+
<script type="application/ld+json" is:inline>
129+
{`{
130+
"@context": "https://schema.org",
131+
"@graph": [
132+
{
133+
"@type": "BlogPosting",
134+
"headline": "Security shouldn't cost extra — MFA isn't an add-on",
135+
"description": "MFA is mandatory under frameworks like NIS2. Learn why legacy VPNs sell it as an add-on and how Defguard builds it in by default.",
136+
"image": "https://defguard.net/images/blog/mfa-isnt-an-addon/mfa-hero.png",
137+
"author": {
138+
"@type": "Person",
139+
"name": "Robert",
140+
"jobTitle": "Co-Founder",
141+
"affiliation": {
142+
"@type": "Organization",
143+
"name": "Defguard"
144+
}
145+
},
146+
"publisher": {
147+
"@type": "Organization",
148+
"name": "Defguard",
149+
"logo": {
150+
"@type": "ImageObject",
151+
"url": "https://defguard.net/svg/logo-full.svg"
152+
}
153+
},
154+
"datePublished": "2025-11-05",
155+
"mainEntityOfPage": {
156+
"@type": "WebPage",
157+
"@id": "https://defguard.net/blog/mfa-isnt-an-addon/"
158+
},
159+
"articleSection": "Security, VPN, MFA, WireGuard",
160+
"keywords": ["MFA", "FortiToken", "WireGuard", "NIS2", "VPN", "Defguard", "SSO", "IdP"]
161+
},
162+
{
163+
"@type": "FAQPage",
164+
"mainEntity": [
165+
{
166+
"@type": "Question",
167+
"name": "How much does Fortinet MFA cost?",
168+
"acceptedAnswer": {
169+
"@type": "Answer",
170+
"text": "Fortinet's MFA isn't a single price. It often requires separate purchases like FortiToken (for MFA) and FortiAuthenticator (for identity). These components are necessary for compliance and make the true TCO much higher than the base price."
171+
}
172+
},
173+
{
174+
"@type": "Question",
175+
"name": "Is FortiToken required for Fortinet VPN MFA?",
176+
"acceptedAnswer": {
177+
"@type": "Answer",
178+
"text": "Yes. In most FortiGate VPN configurations, FortiToken is the required component to enable MFA — as hardware or mobile tokens, licensed per user."
179+
}
180+
},
181+
{
182+
"@type": "Question",
183+
"name": "What is a good FortiToken alternative?",
184+
"acceptedAnswer": {
185+
"@type": "Answer",
186+
"text": "A modern alternative to token-based MFA systems. Defguard includes Multi-Factor Authentication as a built-in feature — supporting standard TOTP codes from authenticator apps (like Google Authenticator) and a native user database (IdP) in every deployment. There's no need for separate hardware or mobile tokens."
187+
}
188+
},
189+
{
190+
"@type": "Question",
191+
"name": "Are there VPNs with MFA included in the base price?",
192+
"acceptedAnswer": {
193+
"@type": "Answer",
194+
"text": "Yes. Defguard, as a modern WireGuard®-based platform, includes MFA by default — built into every deployment, with no extra licensing or modules."
195+
}
196+
}
197+
]
198+
}
199+
]
200+
}`}
201+
</script>

0 commit comments

Comments
 (0)