Many security solutions are too isolated to use data from different areas of risk in order to make informed security decisions.
A smarter solution analyzes several factors, taking into account the risk of the user, their device, location, and other attributes before granting access to an application.
In addition to prompting users with two-factor authentication to verify their identity, Duo Access checks every device for:
Duo’s Unified Endpoint Visibility dashboard gives you actionable data you can use to create custom device access policies to restrict access to your applications from risky devices.
Enforce contextual, adaptive authentication policies to grant or block authentication attempts based on user role; device security (biometrics, screen lock and disk encryption), geo-location, network controls and use of anonymous networks, like Tor.
Duo Access also gives you the option to restrict access based on location and anonymous networks.
Secure devices by enabling your users to update their own out-of-date or inadequately-secured laptops, desktops, and mobile devices. Using Duo’s Self-Remediation feature, you can automatically prompt users to update their software and security settings at each login attempt.
Most organizations significantly underestimate how many different devices access their corporate applications - in addition to corporate-issued devices, users log into work applications using their personal smartphones and laptops. Traditional device management solutions require the installation of agents, which can lead to bad user experiences, privacy concerns, and limited coverage of devices.
Duo Access gives you insight into every device accessing your corporate applications without deploying agents. Duo’s Unified Endpoint Visibility shows you every device on your network, not just the ones your company manages. This can lower deployment support and ongoing management, saving you time while providing complete visibility.
Keep an eye on user behavior and continually verify device trust with Duo Trust Monitor. Trust Monitor ingests authentication information and creates a behavioral baseline. It then surfaces anomalies in users' daily workflows. These events can inform proactive investigations and provide insight into the efficacy of your security policies. Duo Trust Monitor events can also easily complement existing SIEM solutions via API.