Cisco Duo Blog
Multi-Factor Authentication-MFA
4 key pillars of building an identity security program
Strengthen your identity security program. Learn the 4 key pillars for building robust IAM. Enhance your security framework.
Take the guesswork out of policy evaluation with Duo’s Policy Calculator
Duo's Policy Calculator simplifies policy creation and management. Admins can see which policies apply and break down final policies rule-by-rule.
Secure identities on any device, anywhere: Introducing Duo Desktop Authentication
Duo Desktop authentication allows users to authenticate from a single laptop or desktop seamlessly and securely, offering an easy to deploy auth experience.
Harmonizing access control with routing rules
With the introduction of Routing Rules, Duo SSO adds support for authenticating users to multiple SAML identity providers and multiple AD sources.
Turning Microsoft MFA requirement for Azure into epic security win with Duo
You can satisfy Microsoft's mandatory MFA requirement for Azure using several Duo configurations, better protecting any Azure resources you're using.
Now available: Duo Federal Edition integration with Microsoft Entra ID
Duo custom control for Microsoft Entra ID Conditional Access provides strong secondary authentication, along with Duo's granular access policies.
Authentication alone is failing: Introducing Continuous Identity Security
Introducing Continuous Identity Security. Implement real-time adaptive authentication & strengthen your security posture. Protect your identities with Duo.
Best practices for enrolling users in MFA
Enrolling users in MFA is essential for security, but enrollment can be a logistical challenge. We unpack best practices for enrollment in our blog.
Announcing Identity Intelligence with Duo
Cisco & Duo are doubling down on a security-first approach to identity & access management. Learn about Cisco Duo's identity security capabilities.
A clear and present need: Bolster your identity security with threat detection and response
IT teams need an identity security program built on a strong foundation with the right tools. Learn how to design a program, and how to implement ITDR.