The 2020 Duo Trusted Access Report shows a significant increase in year over year growth in remote access and the use of cloud applications. We show you how to secure cloud and remote app access in this article.
The 2020 edition of the Duo Trusted Access Report analyzed over 26 million devices, 500 thousand applications and more than 700 million authentications per month to gain deep insight into user security behaviors and endpoint security. Learn how policy controls can protect devices.
“Turns out, people aren’t all that good at predictions,” I wrote in my 2020 article. How true this turned out to be. Few could foresee the turns 2020 would take.
Buh bye Flash! Before we send you off to your retirement, we'd like to take a moment to say a few words.
This last 10 months has given security practices the ability to make changes to better democratize security for their employees. We have been able to settle in with a better understanding of how to handle our remote workforce requirements while reducing the risk.
As we put 2020 in our rearview mirror, and look forward to 2021 with dewy-eyed optimism, I want to take a moment to celebrate cybersecurity and anticipate things to come.
Users and industries are moving away from unsafe SMS-based authentication methods, making push the dominant user choice for 2FA (two-factor authentication). Learn why!
Our goal for this blog post is to take a deeper look into the metrics that we collect and report on, the story they tell, and how they drive quality improvements. We hope that readers can walk away with actionable ideas on metrics that can help keep quality front and center of the software development process.
Alerts you can use. Duo Trust Monitor does the heavy lifting of highlighting recent authentications that deviate from the normal patterns. To maintain a current understanding of those patterns, models are updated on a frequent basis and adapt quickly to new emergent behaviors.
We invite you to learn more about how Duo Security and FEITIAN work together to provide flexible and strong authentication options for organizations of all sizes with a variety of security tokens to fit your needs.