Cisco Duo Blog
Product & Engineering

Take the guesswork out of policy evaluation with Duo’s Policy Calculator
Duo's Policy Calculator simplifies policy creation and management. Admins can see which policies apply and break down final policies rule-by-rule.

Secure identities on any device, anywhere: Introducing Duo Desktop Authentication
Duo Desktop authentication allows users to authenticate from a single laptop or desktop seamlessly and securely, offering an easy to deploy auth experience.

Harmonizing access control with routing rules
With the introduction of Routing Rules, Duo SSO adds support for authenticating users to multiple SAML identity providers and multiple AD sources.

Now available: Duo Federal Edition integration with Microsoft Entra ID
Duo custom control for Microsoft Entra ID Conditional Access provides strong secondary authentication, along with Duo's granular access policies.

Revolutionizing Palo Alto VPN Access with Duo SSO
Protect Palo Alto VPN logins with Duo Single Sign-On via SAML 2.0, preventing unwanted access and streamlining the user experience.

Dive in with Duo Passport: A secure, seamless future
Dive into Duo Passport for a secure, seamless future. Experience advanced identity security & access management. Transform your operations.

Authentication alone is failing: Introducing Continuous Identity Security
Introducing Continuous Identity Security. Implement real-time adaptive authentication & strengthen your security posture. Protect your identities with Duo.

Announcing Identity Intelligence with Duo
Cisco & Duo are doubling down on a security-first approach to identity & access management. Learn about Cisco Duo's identity security capabilities.

Zero trust application access: Protecting against compromised endpoints
Increase application security by blocking compromised endpoints in order to achieve a Zero Trust using Cisco Secure Endpoint and Duo Trusted Endpoints.

Verified Duo Push makes MFA more secure
Make your MFA more secure with Verified Duo Push. Protect against advanced phishing attacks & enhance user authentication. Strengthen your security.