Cisco Duo Blog
Identity and Access Management IAM
Cisco Systems Named a Customers’ Choice in Gartner® Peer Insights™ 2026 Voice of the Customer for User Authentication
Verified reviews led to Cisco Duo’s recognition as a Customers’ Choice in the Gartner® Peer Insights™ 2026 Voice of the Customer for User Authentication Report for the second year in a row.
Why identity-led security services matter now for MSPs
Customer security expectations are changing. Learn why identity‑led security is becoming a practical growth opportunity for MSPs right now.
The Hitchhiker’s Guide to Shibboleth
Shibboleth IDP is an open-source identity provider that requires bravery to deploy. This blog post walks through how to conquer configuration.
Identity security looks different by industry. Here’s how MSPs can keep up.
Identity security challenges vary by industry. Learn how MSPs can deliver scalable, easy-to-manage identity security across every environment.
Cisco Secures 125K user identities with Duo while advancing passwordless journey
Cisco uses Duo to secure its global workforce of close to 125,000 users and 285,000 devices, and has implemented strategic initiatives like passwordless.
From protocol to practice: Secure the AI agent ecosystem with Duo
Secure your AI agent ecosystem with Duo’s new MCP integration, supporting the latest OAuth standards for scalable, least-privilege access control.
How to secure the holidays & prep your 2026 IAM strategy
Learn pro tips to defend your business from holiday cyber threats and third-party risks with expert IAM, device trust, and AI strategies. Stay secure this season!
Standing out in a crowded MSP market
Learn how MSPs can stand out by turning quiet security into visible results with Duo, delivering trust, compliance, and measurable outcomes.
Securing for third-party risk with Duo for identity management
Discover how Duo’s IAM solutions secure third-party access with phishing-resistant MFA, flexible user directory, and streamlined identity management.
Thwarting adversary-in-the-middle attacks with Proximity Verification
Bypassing of traditional MFA using techniques like adversary-in-the-middle are gaining momentum. Protect your logins with Proximity Verification.