 
                                
                            | FreeFor 1-10 users | Essentials | AdvantageMost popular | Premier | |
|---|---|---|---|---|
| Price per user/month | — | $3 | $6 | $9 | 
| MFA Protect against stolen credentials and account takeover with Duo MFA | ||||
| Duo Directory Utilize Duo as the primary source of truth for user directory, authorization, and attribute management | ||||
| Phishing-resistant MFA Achieve phishing resistance by verifying the access and authentication devices are in close proximity at login | ||||
| Complete Passwordless Authenticate securely and eliminate passwords entirely using Duo Mobile and FIDO2 | ||||
| AI Assistant Investigate and remediate user access issues and find configuration and administration guidance | ||||
| Single Sign-On Log in only once to access multiple applications with Duo SSO | ||||
| Unlimited Applications Secure access to any number of applications, whether cloud-based, on-premises, or custom | ||||
| Trusted Endpoints Check if device is registered or managed before allowing access | ||||
| Duo Passport Improve productivity without compromising security by making the first login the only login | ||||
| Session Theft Protection Mitigate the risk of session hijacking and token theft by significantly reducing or eliminating the use of stealable cookies | ||||
| Device Health Check device security posture before granting access. Provide visibility into security health of devices trying to gain access | ||||
| Risk-Based Authentication Dynamically adjusts authentication requirements in real time based on risk signals | ||||
| Cross-identity Visibility and Analytics Gain unified visibility and AI-driven analytics across diverse identity sources | ||||
| Identity Threat Detection and Response (ITDR) Detect, analyze, and respond to identity-based threats, both proactively and reactively | ||||
| Identity Security and Posture Management (ISPM) Identify gaps, vulnerabilities, and inconsistencies in identity posture and receive impact and remediation recommendations | ||||
| Remote Access Securely access private resources without a VPN using Duo Network Gateway | ||||
| Security Agent Verification Limit device access to applications based on presence of an endpoint protection product |