<![CDATA[The Duo Blog]]> https://duo.com Duo's Trusted Access platform verifies the identity of your users with two-factor authentication and security health of their devices before they connect to the apps you want them to access. Tue, 05 Aug 2025 20:05:11 +0000 en-us info@duosecurity.com (Amy Vazquez) Copyright 2025 3600 <![CDATA[The Total Economic Impact™ of Cisco Duo: 198% ROI and $4.4M NPV]]> sgrebe@duo.com (Scott Grebe) https://duo.com/blog/total-economic-impact-of-cisco-duo https://duo.com/blog/total-economic-impact-of-cisco-duo Product & Engineering Tue, 12 Aug 2025 00:00:00 +0000

The smartest cybersecurity investments don’t just help businesses avoid losses, they increase productivity and satisfaction at the same time. To measure the value achieved through strong identity security, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study for Cisco Duo.

Forrester consultants interviewed seven decision-makers about their experiences with Duo and the benefits, costs, risks, and flexibility of their investments. Following these sessions, Forrester aggregated the results and conducted an in-depth financial analysis for a composite global organization with annual revenues of $2.5B and 10k full-time employees (FTEs).

The resulting TEI study that published in July 2025 showed the composite organization achieved substantial value over a three-year period by investing in Duo.

The bottom line? Duo represents a smart investment.

Forrester writes in the study: “A positive project NPV normally indicates that the investment should be made unless other projects have higher NPVs.” Duo’s 198% ROI and $4.4M net present value (NPV) point to a sound and rewarding investment.

The commissioned study conducted by Forrester Consulting on behalf of Cisco highlights the fact that Duo delivers transformative benefits on three critical fronts: stronger security, higher productivity, and greater operational efficiency.

Without a centralized identity and access management (IAM) solution, interviewees told Forrester their organizations struggled with security gaps, compliance challenges, and operational complexity. Some reported applying weak MFA processes for critical systems like VPNs, leaving users reliant on vulnerable passwords as their primary method of authentication.

Companies that do not have strong identity security face higher risk from phishing attacks, credential theft, and brute-force intrusions. A single compromised password could give adversaries access to multiple systems and pave the way for lateral movement leading to devastating breaches.

With its official expansion into the IAM market, Duo overcomes the limitations of traditional IAM solutions that emphasize business enablement over—and at the cost of—robust security. In the study, Forrester notes that Duo is:

A leading IAM solution that takes a security-first approach to address modern identity-based threats without compromising usability. It delivers comprehensive protection through security-first identity, end-to-end phishing resistance, and unified identity intelligence.

After investing to make Duo the cornerstone of their identity strategies, organizations strengthened security by closing visibility gaps and controlling who logs in from where using what devices.

The TEI calculated the overall value of Duo’s cyber risk reduction to the composite organization at $1.6 million citing measurable improvements in breach prevention, identity security, and threat detection. The TEI notes that Duo combines user and device authentication to create layered protection against unauthorized access to resources that includes strong MFA, end-to-end phishing resistance, device verification, and unified identity intelligence. This layered approach helps the composite reduce the likelihood of unauthorized access leading to a breach and minimize breach-related costs such as legal fees, data recovery, and reputational damage if one did occur.

Duo improves security through:

  • Best-practice logins

  • Visibility across applications

  • Threat detection powered by machine learning

  • Disruption of the attack chain to block lateral movement toward sensitive systems

But while the “killer app” for multi-factor authentication (MFA) is still improving defenses against identity-led attacks, Duo’s ability to enhance productivity has even greater financial impact.

Interviewees told Forrester consultants that Duo reduces the time it takes to log in, simplifies access across all applications, and minimizes disruptions throughout the workday.

The CISO at a technology services company noted:

"[Prior to Duo,] it was not uncommon [to have] a dozen logins a day . . . If you were using a password manager, hopefully it [worked in] a couple of clicks. If you were not signed in to your password manager, at best you would have to hand-type out your password, [which would take] maybe 30 seconds, and then you would have differing degrees of MFA or login challenges."

With Duo helping to mitigate friction and streamline authentication, end-users save time and experience less frustration. Duo Passport and Session Theft Protection extend trust across multiple applications and throughout entire user sessions so employees don’t get interrupted while working to authenticate again.

The TEI calculated the accumulated three-year value of enhanced productivity achieved using Duo at $4.7 million based on improved user experience (UX) saving full-time employees (FTEs) 137,500 hours per year. Instead of managing multiple logins, the study says Duo lets users “get to work faster and stay productive with fewer interruptions.”

Duo’s straightforward, user-friendly MFA simplifies onboarding and reduces login friction with a consistent, simplified experience across all clients, web-based apps, and browsers.

Drivers to adopting Duo include a variety of operational benefits including:

  • Streamlining identity operations to reduce complexity

  • Seamless integration with SaaS and on-premises applications and VPNs

  • Support for cloud and hybrid environments

  • Agility and scale as organizations expand

  • Out-of-the-box support for third-party tools

Without Duo, SecOps teams battled fragmented authentication systems with limited visibility. Disparate logs and platforms made anomaly detection and incident response (IR) even more challenging.

After investing, the TEI concludes:

Duo helps teams identify and address weak points in the authentication landscape and to scale and improve their security posture without overburdening internal teams. By offloading authentication and simplifying infrastructure, Duo enabled scalable protection with efficiencies for teams across security operations, IAM, and governance, risk, and compliance (GRC).

Highlights of Duo’s time-savings and workload reduction benefits include:

  • IR improvements worth $276K — The TEI calculates Duo saves IR teams more than 5,000 hours per year by automating identity risk assessments, reducing false positives, and creating actionable visibility. Focusing on real threats faster reduces authentication-related IR efforts by 50%.

  • IAM efficiency gains worth $205K Duo simplifies provisioning and empowers IAM teams to scale securely while maintaining strong administrative oversight across the IAM lifecycle.

  • Cyber insurance premium reductions worth >$89K — Duo helps IAM leaders navigate complex compliance and cyber insurance requirements, streamlining workflows with audit-ready evidence for a 20% reduction in cyber insurance premiums.

  • Help desk optimization worth $28K — Duo reduces calls to the help desk to reset passwords and unlock accounts, a substantial time savings for the IT team.

Duo has definitely improved our efficiency in security administration. The enhanced visibility provided by Duo, especially when combined with Cisco Identity Intelligence, allows us to identify and address security gaps proactively. This has led to a significant reduction in false positives and faster investigation times, freeing up our security operations center (SOC) analysts to focus on more critical threats.

As security and IAM converge, Duo offers the industry’s only security-first IAM solution that makes organizations safer, stronger, and more agile and efficient:

Along with putting security first and delivering a world-class user experience, participants in the TEI highlighted the value of powerful innovations like passwordless, verified Duo Push, Duo Passport, and the ability of Duo Desktop to verify a user’s identity and the security posture of their device before granting access. Since then, Duo has evolved to include end-to-end phishing resistance capabilities for even stronger identity security:

  • Complete Passwordless Authentication including at initial onboarding and as a fallback

  • Proximity Verification designed to protect against adversary-in-the-middle attacks

  • Session Theft Protection that removes vulnerable “remember me” cookies from the authentication process leaving nothing for cybercriminals to steal

  • Seamless Help Desk Verification enabling identity verification for help desks to guard against social engineering attacks

AI-led insights powered by Cisco Identity Intelligence (CII) help organizations unify IAM and security to build and maintain a fully secure identity infrastructure. Duo offers everything business and IT leaders need to manage and secure identity in one place and an achievable ROI of nearly 200%.

To learn more about potential return on investment your organization might achieve by deploying Duo, read the TEI study.

]]>
<![CDATA[Building social engineering resilience with Duo Identity Verification]]> landyn@cisco.com (Landy Naylor) https://duo.com/blog/building-social-engineering-resilience-with-duo-identity-verification https://duo.com/blog/building-social-engineering-resilience-with-duo-identity-verification Product & Engineering Thu, 31 Jul 2025 00:00:00 +0000

Organizations have put in a ton of work to ensure their data and resources are comprehensively protected with strong user authentication. In doing so, the goalpost has shifted, and attackers are now looking for another way in. According to Splunk, 98% of cyberattacks now rely on social engineering, the vast majority of which are directed towards compromising user identities.

Attacks commonly take place during vulnerable moments in workforce users’ lifecycles. These include:

  • Calling the helpdesk — Organizations are relying on authenticator possession and/or knowledge-based verification questions to aid end-users and can be tricked into offering support to an attacker.

  • Initial enrollment/onboarding — Organizations often send an enrollment link or temporary credentials to a user when they are onboarding. With these processes, organizations can become victims of intercepted credentials and/or entirely fraudulently hired employees. With the large shift to remote work, this is particularly impactful.

  • Self-service — Many organizations offer self-service to provide a 24-hour way for end-users to self-remediate access issues. However, if phishing-resistant authenticators aren’t required for access, attackers could gain access and add their own authenticators for further access. Additionally, self-service is only effective at reducing load on the helpdesk if users have an authenticator to gain access to self-service in the first place.

These moments highlight the trade-off between ease-of-use and security. If organizations choose to be highly secure, they may also experience significantly increased IT costs and end-user friction. Choices made in an effort to operate in a highly secure manner could also have unintended consequences such as missing out on hiring top talent by requiring them to reside near an office.

Other consequences could be higher employee turnover due to the friction with the organization’s rigid security process for users to regain access. On the opposite end, many organizations are operating at the status quo and are therefore at risk of social engineering attacks. They may be aware of these risks but don’t have the proper tools to implement secure processes that can scale gracefully.

But what if your organization didn’t have to make that tradeoff? With the introduction of Duo Identity Verification, organizations can make these once-vulnerable moments resilient to social engineering attacks by ensuring the user who is attempting to gain access is who they say they are. We are giving customers the option to integrate with Persona to offer differentiated experiences that help provide this assurance at the helpdesk, during enrollment, and for self-service account recovery.

This solution allows end-users to quickly and easily verify their identity when contacting the helpdesk for assistance, whether it be identity and access management (IAM) related, or a call in to HR or payroll to update their direct deposit. This is a market-leading offering that integrates identity verification directly into Duo’s security-first IAM platform and is available via the Duo admin panel or Admin API. This functionality will be available to all customers in Beta starting in late July 2025.

This solution provides high identity-assurance during user enrollment, making enrollment codes or email links useless should they happen to fall into the wrong hands. This allows the best of both worlds; the ability to use any of Duo’s flexible end-user self-enrollment methods coupled with high assurance the intended user undergoes it. This functionality is expected to be in Alpha soon, with a wider Beta release expected in late summer 2025.

As mentioned before, self-service is only valuable if it is secure. You also need a credential to access self-service in the first place. Duo plans to add the ability for users to use their identity to regain access to the self-service portal so that they can add or reactivate an authenticator and then independently get back to work. This further reduces an organization’s helpdesk costs while providing the user with autonomy to self-solve. This functionality is expected to be in Alpha by fall 2025, with a wider Beta release expected by the end of 2025.

So how does Duo Identity Verification work? The solution does require a separate Persona account and licensing, but Duo and Persona provide an integration that makes configuration of this solution as simple as possible!

Once everything is set up in Duo and Persona, this is how IDV works.

When the verifying user is redirected to Persona, users will be asked to provide a snapshot of their government-issued ID and take selfie photos. Persona will perform a variety of verification checks depending on how the organization has configured things. Among them are:

  • Various checks to the government ID, such as legitimacy, expiration date, and tampering

  • Various checks to the selfie including liveness detection, deepfake detection, and matching of the selfie to the photo in the government ID

  • Checks to see that the user in Duo matches the user who has undergone identity verification

Once the user successfully completes verification, the Duo admin will be informed of the result, or the user will be taken to the next step of the flow they originally entered. If your organization retains selfies within Persona, it can be used to enable an even faster selfie-only re-verification should the user verify themselves again later.

With these workflows now more resilient to social engineering, organizations can even more confidently support their users, near and far, and achieve deployable end-to-end phishing resistance.

Are you new to Duo? Sign up for a free trial today and learn more about Duo IAM!

Persona is a leading secure identity verification (IDV) platform trusted by organizations across industries. They empower companies to confirm user identities quickly and securely, so legitimate users can continue to do their important work with minimal interruption while stopping attackers in their tracks. Persona offers global support and has flexible options that can be catered to your organization’s unique needs. Learn more.

*Note: The features described above remain in varying stages of development and will be offered on a when-and-if-available basis. The delivery timeline is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.

]]>
<![CDATA[Duo Passport’s patent-pending defense against session hijacking]]> rhaidous@cisco.com (Ranine Haidous) https://duo.com/blog/duo-passports-patent-pending-defense-against-session-hijacking https://duo.com/blog/duo-passports-patent-pending-defense-against-session-hijacking Product & Engineering Wed, 30 Jul 2025 00:00:00 +0000

At Duo, we've been obsessed with a growing threat that keeps security teams up at night: Session hijacking. Recently, we announced a patent-pending breakthrough that marks a fundamental shift in how we think about authentication security. According to the 2024 IBM X-Force Threat Intelligence Index, use of stolen credentials to access valid accounts surged 71% over the previous year and represented 30% of all incidents X-Force responded to, tied with phishing as the top infection vectors. Duo Passport, with its built-in Session Token Theft Protection, directly addresses these escalating threats.

In 2024 alone, sixty percent of all Cisco Talos incident response cases involved identity as a key attack vector, with session theft emerging as an attacker’s favorite shortcut around even the most sophisticated MFA implementations. We're facing an "identity crisis" where attackers no longer need to hack in, they simply log in using stolen credentials. At Duo, we knew we had to do more than incrementally improve existing defenses.

Session token theft exploits a fundamental weakness in how web authentication has worked for decades. When users authenticate, applications issue session cookies to maintain their logged-in state. Attackers have become increasingly sophisticated at stealing these tokens through malicious JavaScript, infostealers like Redline and Emotet, or adversary-in-the-middle attacks. Once they have your session token, they essentially have your digital identity which allows them to bypass passwords, MFA, and most security controls.

Existing solutions treat the symptoms while ignoring the core issue: session trust shouldn’t exist as a separate, portable entity (think cookies).

Duo Passport’s Session Token Theft Protection is a breakthrough in authentication security. It removes session cookies from the Duo authentication flow entirely, relying instead on the hardware security modules built into modern devices, like the Trusted Platform Module (TPM) 2.0 for Windows or the Secure Enclave for macOS. Although individual applications may still use their own session tokens after authentication, Duo Passport secures the critical foundation it controls, significantly reducing the risk of session hijacking. This enhanced protection is uniquely delivered while preserving Passport's premium user experience of seamless access without repetitive logins. Cisco successfully reduced weekly logins from 8 million to 450,000 by deploying Duo Passwordless, Risk-Based Authentication, and Duo Passport.

Core benefits we're delivering:

  • Hardware-backed security that's phishing-resistant

  • Dramatic reduction in authentication friction

  • Platform-agnostic protection (Windows and macOS)

  • Simple deployment through existing Duo infrastructure

  • No vendor lock-in or ecosystem limitations

Duo Passport solves two seemingly opposing challenges: Reducing authentication fatigue while significantly strengthening security. Our customers often told us that constant MFA prompts wore down their users. Duo Passport streamlined this experience by allowing users to authenticate once and access multiple applications across browsers and desktop apps without interruption. Now, in addition to that, it includes built-in protection against session hijacking attacks. In fact, Cisco's own deployment of Duo Passport Session Theft Protection led to a remarkable 52% decrease in cookie-based authentications within 30 days, directly reducing the risk of session hijacking.

Looking at the competitive landscape, we see fundamental differences in approach. Microsoft's token protection works well…if you're all-in on Windows and their ecosystem. Okta focuses on adaptive MFA, which helps but doesn't address the root vulnerability. We've taken a different path: Platform-agnostic, hardware-backed protection that works across your entire enterprise environment.

Together with Cisco Identity Intelligence, Duo Passport creates a foundation for continuous identity verification that adapts to changing risk conditions. Your organization needs an identity infrastructure that grows stronger as attackers become more sophisticated, one that enhances user productivity while minimizing risk in an increasingly dangerous threat landscape. The real question isn't whether session theft attacks will target your organization; it's whether you'll be ready and protected when they do.

Duo Passport Session Theft Protection is currently in public preview. Read more on how Duo helps organizations secure end-to-end phishing resistance.

Start a free trial of Duo’s advanced identity security today.

]]>
<![CDATA[Combine Duo with NetScaler and thwart identity attacks? Yes, please!]]> claytonb@cisco.com (Clayton Ballreich) https://duo.com/blog/combine-duo-with-netscaler-and-thwart-identity-attacks-yes-please https://duo.com/blog/combine-duo-with-netscaler-and-thwart-identity-attacks-yes-please Product & Engineering Thu, 24 Jul 2025 00:00:00 +0000

Imagine you’re hanging out in front of the TV and your phone starts to ding. It’s a push notification for MFA, but you aren’t logging in. That’s worrisome. Now imagine it’s one of your workforce’s users in the recliner, and their attention is so divided, they hastily grab their phone and hit approve to silence it. Now a bad actor is in your environment. These are the types of attacks that are happening in the wild, and the types of real-world behaviors those in charge of security for their organizations face.

Customers using older Duo integrations with NetScaler are struggling to protect against modern-day identity attacks such as the one above. It’s time for something better. Guarding against increasingly sophisticated identity attacks is a must, but it often comes at the cost of usability. Certainly, no one wants to add complexity to NetScaler logins, or any application for that matter. What if easy implementation and a better user experience, all wrapped up in Duo’s most advanced capabilities that help protect against modern identity attacks, were available today? Well, we have great news for you. It is!

With a long existing partnership and integration, Duo has been protecting NetScaler logins with multi-factor authentication, device trust, and posture assessment for many years. Identity threats, growing in sophistication, convinced us it was time to step up our game. Duo laid the groundwork towards this in 2022 with the delivery of the Universal Prompt. Universal Prompt set out to build a platform that protects against modern attack techniques such as MFA phishing and session hijacking, all while improving the end user experience. Enter the Duo Web Integration for NetScaler complete with the Universal Prompt.

NetScaler, in striving to provide a very flexible solution, offers support for many authentication standards such as SAML, which Duo supports with Duo SSO. There are some great reasons why you’d want to use SSO, however, integrating through SAML requires additional elements to be deployed to preserve single sign-on capabilities throughout the Citrix stack. If it’s preferred to preserve the architecture without those additional components, using RADIUS for MFA was a good option. The RADIUS integration between Duo and NetScaler allowed consumers to keep primary authentication in place and use Duo as secondary authentication, while preserving Citrix’s single sign-on capabilities. Remember that whole need for enhanced security though? RADIUS wasn’t providing it.

Duo strived not just to match, but to beat the simplicity of our original NetScaler integration when setting out to modernize and provide better security. Enter, OAuth. If you’re not familiar with OAuth, you can learn more here. With OAuth, Duo can implement a more flexible, secure, simpler integration. Our partners at NetScaler agreed and we all set to task integrating using OAuth, again allowing primary authentication to remain untouched while making the second factor integration easier and more secure. I’d be remiss not to mention OAuth is the native mechanism for integrating the Duo Universal Prompt with many applications, not just NetScaler.

Use of this new integration provides all Duo customers an easier way to integrate and simplifies their deployment by removing the requirement to use the Duo Authentication Proxy and RADIUS integration. This results in NetScaler talking directly to the Duo cloud service and customers keeping their current benefits of device trust and industry leading MFA. This is just the tip of the iceberg. Phishing? Reduced with the use of Duo verified and proximity push. The real magic comes when customers utilize the Duo Advantage or Premier tiers. What does this provide? It opens a myriad of security controls which are critical in protecting users from today’s advanced identity attacks. Use of the Universal prompt within Duo Advantage and Premier provide risk-based authentication, device health checks, user location controls and continuous identity protection with Cisco Identity Security. By combining identity visibility and protecting users from phishing, password spray attacks and so much more, NetScaler is turned into a force of identity protection just by integrating with Duo.

Plenty of customers have successfully used SAML to authenticate users into their Citrix environments. Using Duo as an IdP and the primary authentication source for NetScaler allows for additional benefits such as passwordless authentication or single sign-on with other applications. Should you have the appetite for or have already implemented Citrix infrastructure to support SAML with Citrix single sign-on, using Duo is a great option. If you have a different SAML IdP configured with Duo as the MFA, that’s another great way to protect your NetScaler users with the security benefits of Duo.

All existing customers can see immediate benefits by implementing the Duo Web Integration for NetScaler. For the ultimate in end user protection and defense from advanced identity attacks, customers can upgrade to Duo Advantage edition. For those who have not yet experienced Duo, start your trial today.

]]>
<![CDATA[SE Labs awards Cisco its AAA Rating in Universal ZTNA identity testing]]> sgrebe@duo.com (Scott Grebe) https://duo.com/blog/se-labs-awards-cisco-its-aaa-rating-in-universal-ztna-identity-testing https://duo.com/blog/se-labs-awards-cisco-its-aaa-rating-in-universal-ztna-identity-testing Product & Engineering Tue, 22 Jul 2025 00:00:00 +0000

As security’s new front line of defense, user identities must be fully protected at all times. That’s why after rigorous, first-of-its-kind identity testing, SE Labs® awarded Universal Zero Trust Network Access (UZTNA) from Cisco its highest AAA rating for “Advanced Security IAM Protection.”

Universal ZTNA combines multiple products to deliver zero trust authentication and protection against identity-based attacks:

  • Cisco Duo

  • Cisco Secure Access

  • Cisco Identity Intelligence (CII)

The solution achieved 100% detection and 100% protection against cyber threats, identifying and blocking every attempt to compromise security defenses. The report reads:

UZTNA detected and responded to every malicious access attempt without relying on traditional exploit signatures or simple traffic heuristics. As such, the combined solution achieves the SE Labs AAA award.

"Hackers don’t always need exploits, but they do always need access,” SE Labs Founder and CEO Simon Edwards points out, noting modern attackers target identity to break into critical cloud environments like Microsoft 365.

SE Labs security experts subjected Universal ZTNA to a rigorous round of attacks that proved Duo and the other offerings could handle a range of common threat actor tactics. Testing took place in a real network environment, targeting a Microsoft 365 deployment with privileged and non-privileged accounts. Security experts played the role of attackers, probing for weaknesses and adapting to security controls to see how systems would respond.

SE Labs’ landmark analysis mimicked techniques used recently by prominent threat groups like Scattered Spider, APT29, and APT28. Testing featured 30 attacks across three attack vectors:

  • 12 attempts involved stolen credentials using valid, but compromised, usernames and passwords to gain access

  • 8 tried to bypass MFA using techniques like MFA fatigue and credential stuffing

  • 10 attacks attempted to hijack active user sessions without needing credentials of MFA

Variations ranged from attempting to log in from different geographic locations and devices at unusual hours to MFA flooding, a Scattered Spider go-to tactic and using stolen session cookies to impersonate users and compromise assets without re-authenticating.

SE Labs recognizes that not all MFA is created equal. Edwards writes, “While many people think multi-factor authentication is a silver bullet. It isn’t.” Enter the “new Duo” with a comprehensive solution that combines:

MFA shuts down stolen credentials: Duo MFA routinely blocks attacks that attempt to leverage stolen credentials by requiring users to confirm their identity using additional factors like their mobile phone or thumbprint.

Proximity Verification prevents MFA bypass: Businesses roll out MFA to stop phishing, but hackers attempt to bypass it with phishing and ‘MFA fatigue’ attacks that flood authentication systems with repeat login requests. Duo Proximity Verification leverages the user’s mobile phone to confirm the authentication device is physically close to the device they’re asking to access (e.g., their laptop). It’s a simple, seamless, and highly secure approach to detect and intercept attempts to bypass MFA without requiring expensive hardware tokens or complex configurations.

Session Hijacking Prevention protects mid-session: As part of its enhanced end-to-end phishing resistance capabilities, Duo now includes session theft prevention to stop one of the three tactics employed by the SE Labs testing of UZTNA. The report describes session hijacking as:

An attack in which an attacker takes control of a user’s active session, often by stealing a session token or ID. Attackers may exploit insecure cookies, public Wi-Fi networks and browser vulnerabilities. Once hijacked, the attacker can impersonate the user, access sensitive data and perform unauthorized actions. This threat bypasses normal authentication and is hard to detect.

Threat actors attempt to steal “Remember Me” session cookies used to keep people authenticated during active sessions. Duo removes these cookies and applies patent-pending technology to prevent session hijacking behind the scenes. Duo secures entire user sessions — without inconveniencing people to authenticate again and again.

“Attackers today have choices in overcoming perimeter controls,” Edwards says. “Cisco UZTNA is to be congratulated for its flawless performance at rebuffing our attacks in what is now a very complex environment.”

The SE Labs writeup notes, “Data needs to be accessible, at high speeds, but using strong security. And this security needs to be managed simply. and other modern staples of strong security and a rewarding user experience.”

Along with easy-to-use MFA, Duo features options like single sign-on (SSO), a user directory with lifecycle management (Duo Directory), device trust, and complete passwordless to raise the bar on flexibility, simplicity, and user satisfaction.

“Zero Trust Network Access is key to protecting organizations today, and we’re delighted that our first-of-its-kind Universal ZTNA from Cisco has been awarded the top accolade from SE Labs,” says Raj Chopra, SVP, CPO Cisco Security. “This rigorous benchmark underscores how Cisco’s unique integration of identity security and SASE delivers a true universal Zero Trust solution, providing unmatched protection for the workforce against the diverse and sophisticated attacks organizations face today.”

For more details about the tests and findings, download the full report.

Discover how Cisco Universal ZTNA and Cisco Duo can transform your organization’s security posture. Visit the following resources to explore our innovative approach:

]]>
<![CDATA[Cisco Named a Customers’ Choice in Gartner Peer Insights™ 2025 Voice of the Customer for User Authentication]]> sgrebe@duo.com (Scott Grebe) https://duo.com/blog/cisco-named-a-customers-choice-in-gartner-peer-insights-2025-voice-of-the-customer-for-user-authentication https://duo.com/blog/cisco-named-a-customers-choice-in-gartner-peer-insights-2025-voice-of-the-customer-for-user-authentication Industry Events Tue, 15 Jul 2025 00:00:00 +0000

97% of Customers Would Recommend Cisco Duo

Cisco has been recognized as a Customers’ Choice in the Gartner® Peer Insights™ 2025 Voice of the Customer for User Authentication report. Cisco appears in the upper-righthand quadrant which denotes a Customers’ Choice distinction and received a 97% Willingness to Recommend score based on 130 customer reviews submitted as of February 2025.

The 2025 Voice of the Customer for User Authentication ratings reflect reviews submitted by verified customers during the 18-month period ending February 28, 2025. Overall, 122 Cisco customers rated Duo 4.7 out of 5 for “Deployment Experience” and 126 customers rated Duo 4.7 out of 5 for “Product Capabilities.” Read the Voice of the Customer report.

Where traditional identity and access management (IAM) solutions claim “identity-first security,” Cisco takes a “security-first” approach to identity. A comprehensive IAM solution, Duo provides everything organizations need to secure and manage user identities from day one including:

  • Duo Directory

  • Phishing-resistant MFA

  • Single sign-on (SSO)

  • Passwordless authentication

  • Identity intelligence

Security-first IAM enables organizations to strengthen their security posture, minimize complexity, and modernize and scale their IAM environments. Duo verifies identity and validates trust—all while delivering a world-class experience for users and admins.

Gartner defines “peers” as “verified reviewers of a technology product or service, who not only rate the offering, but also provide valuable feedback to consider before making a purchase decision.” Cisco customers who reviewed Duo talked about the protection, simplicity, and support they gained:

  • Experience Enhanced Security with Duo's Multi-Factor Authentication

    “Implementing Duo within our organization has really helped us become more confident about the security of accessing our data. A few of the many strengths of implementing Duo within our organization are as follows: Duo provides us with a detailed track record of employees' access to the assigned applications. Again, the Duo cloud-based architecture has allowed us to easily scale the solution to meet our growing security needs as per the requirements. Last but not least, Duo Multi-Factor Authentication capabilities have secured our organization’s data from unauthorized access.”

  • Simplifying Security: MFA Services Made Easy with This Product

    "This product is the go-to for MFA services. It is simple to implement and configure, especially with the documentation base that is provided by Duo. Overall, Duo makes it easy to adhere to security requirements, while not interfering with a company's productivity."

  • Security Made Simple: Cisco Duo's Multi-factor Authentication

    “Cisco Duo has been a wonderful experience for me. It's really user-friendly, both from an admin perspective and as someone who uses it daily. Setting it up was surprisingly simple and the multi-factor authentication is solid and gives me peace of mind knowing our accounts are secure."

  • Best User Authentication Solution

    “Duo makes user authentication easy when accessing sensitive business information or when accessing devices. The 2-factor authentication ensures that only permissible users get access. It has been a great tool for boosting data privacy in our business. I like that Duo is very fast yet ensures secure access. With proper authentication, access to data/apps/devices is easy.”

  • Cisco Duo: The Outstanding Multi-Factor Authentication Solution

    “After using various security solutions, Cisco Duo stands out as an exceptional multi-factor authentication (MFA) tool. it has features like fine-grained policies. Duo's overall performance and flexibility make it a good choice. it offers excellent reporting and monitoring features. As a user, the biggest benefit of Duo is its mobile app. Duo integrates well with a wide range of applications. Scalability is another advantage.” 


We invite you to visit Gartner Peer Insights to read more Duo customer reviews or share your own Duo story. We’re proud to say that Cisco has received the most peer review ratings of any vendor in the User Authentication category with 720+ Duo reviews submitted as of June 2025. Visit the Gartner Peer Insights page for this market to learn more about the User Authentication market.

Last but not least, we thank our customers who took the time to submit reviews online. Your feedback helps us innovate to keep your company ahead of evolving threats and reward your invaluable trust in Duo.

Gartner, Voice of the Customer for User Authentication, Peer Contributors, 30 May 2025 

Gartner and Peer Insights™ are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

]]>
<![CDATA[Failing open: A lesson in attention to configurations]]> tmishoe@cisco.com (Tess Mishoe) https://duo.com/blog/failing-open-a-lesson-in-attention-to-configurations https://duo.com/blog/failing-open-a-lesson-in-attention-to-configurations Product & Engineering Thu, 03 Jul 2025 00:00:00 +0000

Duo’s AI and Security Research team takes on cases from customers and beyond, digging into authentication data and finding actionable anomalies that can be searched for, alerted on, or remediated using AI and machine learning.

When chaos strikes, we tend to attribute it to outside causes. In many cybersecurity incidents, however, internal factors come into play— including things like configuration and privilege changes. In this blog, we’ll talk about a recent investigation in which misconfigurations made all the difference.

When the AI and Security Research team received a request from a customer to review their authentication data, it appeared unusual and stood out from other recent cases in many ways. First, it was an in-progress, full scale attack that was still being contained when we received notice. Second, it contained an interesting note—that the attacker may have bypassed Duo authentication entirely.

Thankfully, the attack was noticed quickly, and the attackers’ further lateral movement was prevented. Still, the reporters confirmed that the attacker took over a vital server. The request from the reporters was to find out how Duo authentication could have been bypassed and any other pertinent information regarding the attack that we could glean for them.

With the attack occurring within 3 days of the report, the team could easily sift through the authentication logs. The report also provided an affected machine name, a potentially compromised administrator account username, and one indicator of malicious activity. However, no logs existed for any activity on the affected machine during that timeframe – the customer confirmed that these were erased by the attacker.

We started our search by looking for unusual authentication behavior and errant device registrations. We made a simple query akin to the following pseudocode:

> select * from auth_data where timeframe 01/01/2025 to 01/03/2025 and user =(reportedName) and customer = (customername)

We also looked at device registration data during this period, finding a list of device registrations and removals. Malicious actors commonly either register a new phone of theirs or remove a phone belonging to the legitimate user to gain persistent access to an account.

Below: A set of device modifications surrounding the timeframe of the compromise.

Our first query above resulted in some interesting authentications. The first set were authentications that started but were not completed due to authentication timeouts, all within a few minutes of each other.

The administrator account included in the report was authenticating to a set of different Duo Authentication Proxies (Duo servers hosted by the customer), with all authentications originating from internal IP addresses. This indicates that the attacker was either using a VPN to access internal resources (and had therefore already compromised a computer directly), was using a remote access tool to pivot to an internal resource or was an insider threat who already had authorized access.

After looking through the authentication logs, we focused on the devices associated with the user. There were more than 10 devices associated with this administrator account, some of which were shared by other accounts. This type of behavior is quite unusual and raises alarms – administrator accounts and other accounts with escalated privileges should be carefully managed with the absolute minimum number of devices and users accessing them. Many devices existing on one account (and especially those shared between multiple accounts) can mean many methods of initial access or avenues of further access for an attacker.

We found evidence of account sharing and possible internal access. Even so, how did the attacker bypass Duo MFA protections?

After a careful review of the activity logs on the authentication proxy used to access Duo services, we saw that it had briefly lost connection with Duo services around the timeframe that the attacker gained access.

When Duo authentication proxies can’t communicate with Duo services, they can be configured to do something called ‘failing closed’ - until communications are reestablished, they need to find a different route/backup to access Duo services and gain access to resources. In this case, the authentication proxy (a RADIUS server) was configured by the customer to ‘fail open’ instead.

Failing open any application or system can be exceedingly dangerous to data security and integrity. Instead of looking for an alternative and blocking potential authentications from resources, it essentially removes all barriers preventing access to the resources. This can be useful for things that could cause catastrophic failure without access (such as industrial control or medical systems) but is risky to enable where unnecessary.

In this case, the server could have been removed from the network or denied access to the network in some other manner by the attacker. This also could have been related to some RDP authentication attempts to the server around the same timeframe.

There were several things of concern within this breach that we identified as learning opportunities. The first is the issue of administrator account sharing – this is always dangerous and should be avoided wherever possible. Decreasing the possible traversal pathways of an attacker means less to contain or decommission in the event of a breach and prevents the attacker from gaining higher privileges in other areas.

Finding the server’s access failure (also known as ‘Failmode’) configuration was also a big turning point. In Duo terms, the ‘Failmode’ for a RADIUS server determines what authentications do if Duo services are unreachable. They can either be in ‘safe’ mode (fail open), in which authentications are allowed if the first factor is successful, or ‘secure’ mode, which rejects all authentication attempts if Duo services cannot be contacted.

Misconfigurations are a frequent cause of breaches and can be prevented by comprehensive compliance evaluations and regular configuration reviews on all systems.

Backing up logs was also a piece that could have made this investigation faster to resolve. Attackers frequently cover their tracks by deleting log data, and critical logs can be lost or overwritten quickly. We always recommend more comprehensive log management and forwarding configurations.

By following some simple security principles, you can keep your accounts safe and secure with Duo.

To learn more about secure configuration of your Duo server, check out our knowledgebase topic on configuration best practices. Or peruse all topics on Duo Authentication Proxies.

]]>
<![CDATA[Easier, more effective MFA for ALL: The Duo Universal Prompt project]]> schristopher@duo.com (Scott Christopher) kdavenport@duo.com (Kelly Davenport) https://duo.com/blog/easier-more-effective-mfa-for-all-the-duo-universal-prompt-project https://duo.com/blog/easier-more-effective-mfa-for-all-the-duo-universal-prompt-project Industry News Tue, 01 Jul 2025 00:00:00 +0000

A long time ago, in, well, this galaxy...

Since the earliest days of Duo, we’ve been energized by a core mission: To democratize security. That means designing tools to protect users that they actually want to use. After all, security that no one uses isn’t worth much.

We’ve grown a lot as a company since then, and so has the web—and the technical standards we use to build our tools. As we plan for the future, we’re excited to announce a major initiative that will make the Duo authentication experience even easier and more effective for everyone.

But first, why are we changing at all?

Security tools are consistently viewed as friction points. Traditionally, if a solution sought to improve security, that improvement came with more rigidity and complexity.

And when security tools don’t adapt and evolve, they quickly lose value and become harder to integrate into modern environments. Such tools tend to break when new web and application standards are introduced, and often instigate a pile of help desk tickets when the workforce rejects a now outdated or cumbersome user experience.

At Duo, we plan to solve these problems with our new initiative, called the Universal Prompt Project.

Okay, but what does that mean?

The Universal Prompt Project is a major technical and UX redesign of core Duo functionality, focusing on our web-based second-factor authentication prompt.

Today, we’re providing the first look at this initiative, which will roll out in phases beginning in August 2020 and continue over the next 18 to 24 months. Throughout the project, there will be opportunities to preview and test the product changes, and your participation will help shape what we deliver.

  1. A redesign of our web-based authentication prompt, called the Duo Universal Prompt.

  2. An upgrade to the Duo Web SDK that provides a new mechanism for delivering the prompt to both Duo-developed and partner-built software integrations—without the iFrame.

  3. A redesigned Duo Mobile application that builds upon the improved user experience of the Universal Prompt.

  1. Security Innovation

  2. Ease of Use

  3. Custom Experience

Let’s take a look at each of these broad themes, and then review where we’re going next with this project.

When Duo was founded, we built our prompt on the iFrame. At the time, it was the best way to deliver a multi-factor authentication (MFA) prompt in front of a variety of on-prem and cloud applications. Since then, the industry has evolved and there are better open standards to reliably and effectively insert an MFA prompt into an authentication flow. Meanwhile, the controls and limitations around iFrames have grown. Moving away from an iFrame-based implementation also offers more flexibility and agility as we continue to improve our security practice and user experience.

Over the past 18 months, as we reimagined the technical underpinnings of how we deliver the authentication prompt, we also studied how the authentication experience itself can play a stronger role in educating end-users about security hygiene.

Through extensive user testing, we settled on a handful of changes to the user experience of authenticating via the prompt and Duo Mobile that our research shows will improve users’ trust in MFA and increase adoption of more secure authentication methods such as Push and WebAuthn.

All of these changes add up to a better and more secure experience for end-users as we build on the success of the original Duo Prompt.

Duo is already the most flexible MFA solution, and we've simplified the experience even further. The new Universal Prompt is more adaptive and contextually aware, displaying the best available auth method based on end-user behavior and system capabilities. Onboarding end-users to Duo will also be made even easier via new instructional and educational features, as well as overall usability improvements to the enrollment flow.

Moreover, security for everyone needs to include everyone. That includes people with disabilities, and people using assistive technologies. From day one, we have worked hard to ensure that the Universal Prompt and the redesigned Duo Mobile are accessible and easy to use for all.

The needs of large technology partners and global enterprises are also at the heart of design decisions driving the Universal Prompt Project.

Both the Universal Prompt and the mobile app will expand language support, introduce better help desk contact info, and allow organizations to customize specific branding elements to provide a more seamless, comprehensible, and trustworthy experience for end-users.

We’ve got a lot more to tell you about the Universal Prompt Project, so look for regular blog updates as we delve into more detail on each component of this project.

As we get closer to making these changes generally available, we will provide guidance on planning your migration to the Universal Prompt, including:

  • Communications templates for your organization and end-users

  • Updated documentation and Duo Knowledge Base articles

  • Tools in the Duo Admin Panel to track your progress

With our free 30-day trial you can see how easy it is to get started with Duo and secure your workforce, from anywhere and on any device.

]]>
<![CDATA[What’s new for you: Duo is now identity and access management]]> sgrebe@duo.com (Scott Grebe) https://duo.com/blog/whats-new-for-you-duo-is-now-identity-access-management https://duo.com/blog/whats-new-for-you-duo-is-now-identity-access-management Product & Engineering Fri, 27 Jun 2025 00:00:00 +0000

Blog writing provides a great opportunity to drop some pop culture references that help illustrate your points. For example, “Your identity is your most valuable possession. Protect it.” is a great line from the film, The Incredibles. It’s also very relevant to Duo customers. Duo’s long been a leader in defending against identity-based threats and securely managing access to critical assets. However, we’ve evolved into something more. Duo is now a security-first Identity and Access Management (IAM) solution. You may have seen our recent announcement.

This is exciting news for Duo customers. We know traditional IAM solutions are failing to protect against attacks that target users’ identities. They’ve become insecure, costly, and overly complex to implement. And attackers have gotten really good at stealing user credentials to the point where they can simply log in, not hack in. They’re also using AI to automate and accelerate their attacks. Clearly something had to change.

This became the driving force behind Duo IAM. As a Duo customer, you may be thinking, "This sounds really cool.” And like Kevin Costner’s character in the film Field of Dreams, you may be wondering, “What’s in it for me?” Let’s take a look.

As a security-first IAM solution, Duo integrates all the components needed to serve as the sole IAM platform, while operating as a unified defense layer across your existing identity infrastructure. With the announcement of Duo IAM, we’re launching impactful new capabilities to help organizations achieve security by default, and usability that people love. Within those capabilities are new features Duo customers can take advantage of in their identity stack. So, here’s what’s in it for you.

At Duo, we take a security-first approach to IAM. This means we believe security should be a foundational component of an IAM solution, not an add-on. While Duo started out with MFA, over the years we’ve evolved by adding features like passwordless, SSO, and Device Trust. With the addition of our directory, we now have all the pieces to be a security-first IAM provider.

So what’s “new” new with this launch? That would be our Duo Directory functionality that enables Duo to be a full, or complementary, IAM solution. Here are some cool things Duo Directory can do:

  • User management — Duo can serve as your source of truth for managing identity directories, primary authentication, and user attributes.

  • Routing rules — Use Duo as a hub for authentication to route authentication requests between directories when you’ve got more than one.

  • Customer attributes — Go beyond the built-in attributes by creating and storing your own set of custom attributes to further define user identities.

  • Automated provisioning — Simplify user provisioning, changes, and deprovisioning to applications using direct API and SCIM (System for Cross-domain Identity Management) integrations.

  • AI Assistant — Duo’s out-of-the-box AI Assistant helps with all sorts of tasks like managing access, streamlining configuration, even speeding up user investigation when someone is stuck.

End-to-end phishing resistance means we protect your users from phishing attacks at every step of the identity lifecycle, starting with enrollment, to OS and application login, all the way to the help desk.

  • Proximity Verification — Prevent MFA bypass by verifying the authentication device (your mobile phone) and access device (your laptop) are in close physical proximity.

  • Session theft prevention — Guard against session hijacking by proactively removing session cookies and replacing them with a trusted signature Duo controls. That way there’s nothing for the attacker to steal.

  • Complete passwordless — A user never needs to have a password in Duo Directory. However, for uses cases still tied to passwords, we enable you to ditch passwords from attack points like the enrollment process and authentication fallback.

  • Identity Verification integration — Block social engineering attempts at the help desk from hackers pretending to be an employee in need of assistance by re-establishing trust via the use of a government ID.

Duo leverages identity intelligence to deliver deep visibility across your ecosystem, gathering identity insight and using AI to analyze that information. This ensures continuous monitoring, accelerates detection, and enables proactive responses to identity threats before, during, and after login.

  • User trust level — Dynamically assess user risk level by analyzing user behavior, context, and historical data across multiple identity sources—then seamlessly share this level to enrich relevant security tools and workflows.

Delivering an exceptional experience for users and admins has always been a Duo tenet. It underpins everything we do, including the features we build like the ones I just mentioned. Our goal in delivering a delightful experience for everyone is to frustrate attackers, not users.

These are exciting times for Duo customers. With Duo IAM, you get a full identity and access management solution that puts security first. You know what else is exciting? We’ve added almost all of the new features into our base edition, Duo Essentials, so they’re available to every Duo customer.

Not only that, we also haven’t changed our prices. That’s right. More features and more security for the same price. To quote Matt Damon’s character from the film The Martian: “Wow, this is amazing!” We hope you think so too.

]]>
<![CDATA[Duo Proximity Verification: Deployable phishing-resistant MFA]]> jaho2@cisco.com (Janet Ho) https://duo.com/blog/duo-proximity-verification-deployable-phishing-resistant-mfa https://duo.com/blog/duo-proximity-verification-deployable-phishing-resistant-mfa Product & Engineering Thu, 26 Jun 2025 00:00:00 +0000

Rolling out phishing resistant authentication is critical, but many organizations struggle with the complexity and cost of deploying hardware-based solutions like security keys at scale, all while trying to stay ahead of modern phishing attacks. That’s why we've introduced our new Proximity Verification feature. It removes friction, gives you a smoother and more secure experience, and it’s cost-effective for your organization.

Our proximity verification feature uses Bluetooth Low Energy to confirm that a user’s device is near their computer during login. Imagine logging in without entering codes or accidentally forgetting your hardware key. Proximity Verification makes this a reality.  By design, it prevents bad actors from tricking users into approving authentication requests when they are accessing a computer in a different location from end users.

Proximity verification also prevents users from clicking and entering information into malicious links by checking the origin of the website the request came from. If the request does not come from a valid domain, we will deny the authorization request. This is similar to how modern security standards like FIDO2 verify the legitimacy of login requests to block phishing attacks.

Proximity verification is a great fit for organizations that want strong security without added complexity. It’s especially well-suited for teams that:

  • Are focused on securing against modern phishing attacks

  • Have limited budget or operational capacity to purchase and distribute hardware like security keys

  • Have already made significant investment in mobile authenticators for 2FA or push based login

  • Phishing resistance that’s simpler: Stronger security that is just as secure as FIDO2 but is already included on your device via Duo Mobile. This security feature is built in, making it secure by default.

  • Cost-effective even as your company grows: allows you to securely authenticate from your laptop, no need to juggle extra devices like security keys or worry about biometric upgrades. It cuts down the operational hassles of purchasing, distributing, and managing additional hardware.

  • No more typing in codes: Bluetooth auto-fills verification codes, so users don’t have to. If you’re already using Duo, nothing changes in how you use it day to day, just a smoother experience with even stronger security behind the scenes

With Proximity Verification built into Duo’s security-first IAM solution, your organization gets strong, phishing-resistant authentication without the usual complexity and costs. It’s simple to deploy and scale, helps you meet security requirements, and keeps users protected from day one. There's no need to enter codes or carry extra hardware. Authentication just works when your device is nearby, making the log experience fast and seamless.

Want to learn more? Head to our phishing prevention page or check out our editions data sheet. Looking for technical information? Head to our documentation on proximity verification authentication.

Ready to give it a try? Sign up today.

]]>
<![CDATA[End-to-end phishing resistance that's actually deployable]]> tkietzman@duo.com (Ted Kietzman) https://duo.com/blog/end-to-end-phishing-resistance-thats-actually-deployable https://duo.com/blog/end-to-end-phishing-resistance-thats-actually-deployable Product & Engineering Thu, 19 Jun 2025 00:00:00 +0000

In the modern cybersecurity landscape, attackers are no longer just one step ahead—they’re miles ahead. They know your organization likely uses multi-factor authentication (MFA). In fact, they’ve come to expect it. But here’s the problem: not all MFA is created equal, and attackers have learned to exploit its weaker forms.

Phishing-resistant MFA is the answer, but—it’s been notoriously difficult to implement at scale for all workers and all use cases. Traditional solutions often require complex setups, cumbersome hardware tokens, or clunky configurations that frustrate users and IT teams alike. And, if a security control isn’t deployable; it’s not usable. And if it’s not usable, it’s not protecting anyone.

We need a new way forward.

At Duo, we’re working to make phishing-resistant authentication not only the strongest defense against identity-based attacks, but also easy to deploy and manage.

The numbers don’t lie: Cisco Talos found that 60% of breaches today involve compromised identities. Yet, Talos isn’t the only threat research organizations uncovering the identity problem. Basically, all reports that include data on breaches conclude that: identity is involved in the majority of said breaches.

Attackers aren’t just targeting login credentials anymore—they’re expanding their scope and upgrading their techniques. From enrollment processes to fallback mechanisms and even help desk interactions, every step of the identity lifecycle is under fire.

At Duo, we’re expanding our functionality from providing MFA at application login—to defending the entire identity attack surface. We’ve built an end-to-end solution that secures every vulnerable point, from initial user enrollment through authentication and fallback to mid-session – all the way through to help desk interactions. And we’ve done it in a way that’s deployable—no special hardware, no endless configurations, no headaches.

Here’s how we’re doing it:

  1. Proximity Verification: The only phishing-resistant MFA that’s easy to deploy
    Proximity Verification is Duo’s breakthrough in phishing-resistant MFA. By using your mobile phone to verify that the legitimate user is physically near the device requesting access, we eliminate the need for hardware tokens or complex configurations. It’s simple, seamless, and highly secure—just the way it should be.

  2. Complete passwordless authentication
    Passwords are the weakest link in the authentication chain, and attackers know it. That’s why Duo is committed to eliminating passwords entirely, even at the most challenging stages like enrollment and fallback. Our passwordless solution removes stolen credentials from the equation, making it much more difficult for attackers to gain access

  3. Session theft protection
    Attackers are increasingly leveraging session hijacking—stealing an authenticated session cookie to bypass MFA entirely. Duo’s session theft protection technology defends against this advanced technique by removing the session cookie itself. Duo replaces the session cookie with a cryptographically signed proof of authentication that we control. This effectively removes the jewel from the safe and leaves an attacker with nothing to steal!

  4. Help desk identity verification
    Social engineering attacks on help desks are on the rise, and they’re shockingly effective. To counter this, Duo has partnered with identity verification provider Persona to protect help desk interactions. By adding a layer of secure identity verification, we shut down social engineering attempts before they can gain any traction.

What sets Duo apart from other providers isn’t just our technology—it’s the fact that we’ve made it deployable and user-friendly without compromising security. Traditional phishing-resistant solutions have been plagued by high deployment complexity, requiring organizations to choose between security and usability. We say: why not have both?

With Duo, you get:

  • No Hardware Hassle: Say goodbye to clunky tokens and complex configurations. Duo’s solutions leverage mobile devices to simplify deployment.

  • An End-to-End Solution: From enrollment through to the help desk, we have the broadest coverage over the identity attack surface.

  • A Seamless User Experience: Security that doesn’t frustrate users or administrators.

The identity threat landscape is evolving, but with Duo’s end-to-end phishing resistance, so can your defenses. Let us help you make the shift to stronger, simpler, deployable security that actually works.

Because at the end of the day, attackers are relentless. Shouldn’t your defenses be, too?

To learn more about Duo’s phishing-resistant MFA and how it can protect your organization, check out the new Duo site or reach out to an identity expert.

]]>
<![CDATA[New device? No problem: Enhanced Duo Instant Restore for Android]]> johbruce@cisco.com (John Bruce) https://duo.com/blog/enhanced-duo-instant-restore-for-android https://duo.com/blog/enhanced-duo-instant-restore-for-android Product & Engineering Tue, 17 Jun 2025 00:00:00 +0000

We’re excited to announce a major update to Instant Restore for Duo Mobile on Android. This update brings multiple improvements which make it easier to move to a new device without losing access to your MFA accounts.

Before we dive into the new feature, let’s quickly review how Instant Restore worked on Android prior to this update. When backing up both Duo and third-party accounts, the steps to start backing up are:

  1. Enable Instant Restore in Duo Mobile’s settings

  2. Select a Google Drive account for storing backups

  3. Enable the toggle to automatically reconnect third-party accounts

  4. Create and confirm a password for encrypting your third-party secrets

When restoring from a Google Drive backup, the steps are:

  1. Select the Google Drive account your backup is stored in

  2. Open Duo Mobile on your old device and generate a QR code

  3. Scan the QR code from your new device

  4. Re-enter the password created in step 4 above to reconnect third-party accounts

The new version is simplified to eliminate several points of friction from the old version, namely:

  • Your old device is no longer required to reactivate Duo accounts

  • No QR code to scan on your old phone when reactivating Duo accounts

  • No password to remember when reconnecting third-party accounts

Since there are less requirements to restore your Duo accounts, this will help Duo Mobile users resume authenticating more seamlessly without requiring support from their Duo administrator.

The new update integrates with Google’s system backup functionality built into Android. The new version of Instant Restore will be used when Duo Mobile detects Google backup is enabled and a passcode is set on the device. Once these conditions are met, Duo Mobile will create end-to-end encrypted backups of all Duo accounts which are eligible for Instant Restore as a part of your Google backup. This backup will also include third-party accounts when the third-party reconnect toggle is enabled in Duo Mobile’s settings.

Since the backup is end-to-end encrypted, no one else can read the backup without your device passcode, and there’s no need to remember a special password when restoring third-party accounts! Android schedules system backups based on several factors like battery level, usage, and network conditions–but in practice this happens every few days. A backup can always be manually triggered in Android settings. See Google’s docs for more info.

Your old device is no longer needed to reactivate Duo Accounts, since the reactivation secrets are stored in the encrypted backup. When setting up a new Android device, log in to the same Google account, select the cloud backup created by your old device, and enter your old device’s passcode. Android will automatically restore Duo Mobile’s backup. Your accounts will automatically be reactivated on first launch of Duo Mobile, and the corresponding Duo accounts will be deactivated on your old device. As a precaution, we’ll also send a push notification to your old device to make sure this reactivation was performed by you. If you confirm this reactivation was not done by you, then both devices will be deactivated and an email will be sent to your administrator.

The prior version of Instant Restore based on Google Drive is still available and can be used when system backup or a passcode aren't set up on your device. You can also still restore from your Google Drive backup and manually reconnect accounts with the QR code from your old device (for Duo accounts) and a password (for third-party accounts) in case your new device wasn’t set up from your old device’s cloud backup. Making the older version of Instant Restore available as a fallback helps ensure that you won’t be any worse off in case a step was missed using new restore.

Are you ready to upgrade? Here’s how to do it:

  1. Make sure you have Duo Mobile version 4.83 or higher installed.

  2. Enable Google Backup in Android System Settings. Make sure a backup has run since Duo Mobile was installed.

  3. Enable a pin/pattern/passcode for the lock screen on your device.

  4. Enable "Third-party account reconnect" in Duo Mobile's instant restore settings.

A couple of things to note:

  • Duo Mobile installs within a Work Profile are not supported, unfortunately.

  • The location of the Google Backup in Android System Settings varies by phone manufacturer. On Pixel devices, navigate to Settings > System > Backup. On Samsung devices, navigate to Settings > Google > Backup.

That’s it! Your next system backup will include encrypted account information from Duo Mobile. As aways, you can see the state of your Duo backup on the Instant Restore screen in Duo Mobile settings.

]]>
<![CDATA[Introducing Cisco AI Assistant for Duo]]> brpenney@cisco.com (Brianna Penney) https://duo.com/blog/introducing-cisco-ai-assistant-for-duo https://duo.com/blog/introducing-cisco-ai-assistant-for-duo Product & Engineering Thu, 12 Jun 2025 00:00:00 +0000

We know administrators are busy.

To make securing identity easier than ever, we’re excited to announce the Cisco AI Assistant for Duo, our newest addition in Cisco’s suite of AI Assistants enhancing the security and IT team experience.

Identity administrators today are strapped for time. They manage their directory, application implementations, system migrations, and more. When a user calls the help desk (sometimes a single administrator wearing many hats), their goal is to unblock that user as quickly as possible.

Duo’s AI Assistant is designed to help with this exact task in mind, bringing logs and user information together in one place to make quick access decisions securely. Administrators can now ask the AI Assistant in natural language about access problems instead of sorting through various pages in the Duo Admin Panel or searching for the most relevant documentation page.

For example, in the video below, the administrator asks why a user was denied access. Within a few seconds, the Assistant returns recent events impacting the user including authentications, directory syncs, and policy changes.

For one preview customer, an investigation that might normally take 10 minutes was cut down to 45 seconds with the Assistant.

Another customer specified benefits to help desk processes:

"The AI Assistant is providing helpful information to our help desk users, enabling them to resolve access denial issues faster." — Private Preview Customer

Our approach focuses first and foremost on using AI responsibly to augment admin tasks. We strive for accurate, trustworthy answers that always link to Duo data so you can double check the Assistant’s work.

Administrator permissions are respected like our role-based access control and administrative units, so you don’t have to worry about the Assistant leaking any data. In addition, no Duo customer data is used to train our Assistants.

Today, the Assistant can’t take any action on behalf of the administrator, and in the future actions will require some form of administrative approval.

"It works, it's simple, it's fast and then it will help gain trust in it quickly. People are picking it up and running with it." — Private Preview Customer

We’ve used our internal expertise to ensure answers are accurate and are constantly reviewing and augmenting the LLM to provide better support.

To make this AI Assistant one that will deliver real value to the important use cases, your feedback is essential. Our team looks at every note a user adds to improve the experience.

eedback form for 'Introducing Cisco AI Assistant for Duo' blog post, showing checkboxes and a text box for response improvement suggestions.

The Assistant today is focused on your primary use case of helping users fast. With continued user feedback, the Duo Product team plans to expand coverage of the Assistant to include intelligent capabilities to search through policies, endpoint data, and more.

Try using the AI Assistant next time you’re in the admin panel to help you with your tasks. Here are a few prompts to try:

  • Why is [username] having access issues?

  • Have any devices been registered recently?

  • Which authentication methods are most secure?

The Assistant is available today in public preview to Essentials, Advantage and Premier customers in the U.S. (excluding Federal customers).

AI Assistant is one part of how Duo is bringing strong, security-first IAM without sacrificing user experience. See the full announcement of how Cisco Duo Reimagines Identity Security.

Read the full Duo AI Assistant documentation.

]]>
<![CDATA[Why a security-first approach to IAM matters more than ever]]> tkietzman@duo.com (Ted Kietzman) https://duo.com/blog/why-a-security-first-approach-to-iam-matters-more-than-ever https://duo.com/blog/why-a-security-first-approach-to-iam-matters-more-than-ever Product & Engineering Wed, 11 Jun 2025 00:00:00 +0000

When it comes to securing your organization, one thing is clear: identity and access management (IAM) is no longer just an IT task. It’s a critical component of your security strategy. Yet, for many organizations, IAM solutions have fallen short of delivering security as a foundational feature.

In a recent Cisco survey of 650 IT and security leaders, 73% revealed that security is often an afterthought in identity infrastructure decisions, while 75% identified complexity in identity infrastructure as a key security challenge. In other words, security is taking a backseat in current solutions at the very same time that IAM is getting more difficult to secure. No wonder Cisco Talos found identity at the center of 60% of breaches.

It’s time for a new approach, one that prioritizes security as fundamental. At Duo, we believe in security-first IAM, built from the ground up to simplify identity management, secure workflows, and prevent identity-based attacks.

Traditional IAM tools were designed in a different era, a time when IAM was treated as an IT function with security bolted on later—if at all. This approach often leads to:

  • Increased complexity: Configuring and deploying security controls in many IAM solutions is clunky and frustrating—a hurdle that many administrators don’t want to deal with - creating gaps in security.

  • Added cost: Security features are frequently treated as premium add-ons, making them inaccessible for many organizations.

  • Outdated protection: Even when security features are available, they typically haven't been updated to defend against modern threats, leaving organizations exposed to new attacker techniques.

As highlighted in a recent open letter from the CISO of JPMorgan Chase, fierce competition among software providers has prioritized rapid feature development over robust security. The result? A focus on revenue driving functionality—with insufficient security baked in.

At Duo, we take a different approach. Security isn’t an afterthought—it’s foundational. We make security attainable, not a luxury or an upcharge. This philosophy informs everything we do, from design to deployment. Here’s what we mean by security-first IAM:

Security functionality should not be a way to nickel & dime customers. Organizations that choose Duo will get everything they need to secure their workforce in our base package. This includes:

  • MFA everywhere, by default: Multi-factor authentication (MFA) is a cornerstone of security. Duo enables MFA for all use cases—devices, applications, servers—without additional costs or complicated configurations. It’s not a separate SKU, and it’s not harder to turn on for some users than others.

  • Device trust out-of-the-box: Device trust means you can easily enforce policies that restrict access to corporate resources based on device security posture. Whether you want to allow only managed devices or block unpatched systems, Duo makes it simple.

  • Totally passwordless options: Passwords are a major security vulnerability. With Duo, you can eliminate them entirely. From enrollment to authentication, users can go completely passwordless, reducing phishing risks and improving user experience.

Duo’s approach to IAM isn’t just secure—it’s also flexible and simple.

  • Flexibility: Whether you’re starting fresh or integrating with an existing directory, Duo can adapt to your needs. Use Duo Directory as your primary directory or leverage its capabilities to enhance your existing identity infrastructure. Features like Routing Rules and Custom Attributes make it easier to use Duo in conjunction with existing identity infrastructure.

  • Simplicity: From AI-driven assistance to admin-friendly migration guides, we make deployment easy. Duo’s tools are designed to save you time and reduce frustration, so you can focus on what matters most: protecting your organization.

As organizations face an ever-growing landscape of identity-based attacks, a security-first approach to IAM is no longer optional—it’s essential. Duo redefines IAM by embedding security at the core, not as an afterthought.

Whether you’re looking to modernize your IAM strategy or adopt a solution built for today’s challenges, Duo delivers everything you need to secure identities without compromising on budget, ease of use, or flexibility.

Ready to put security first? Learn more about Duo’s security-first IAM solutions on the Duo Directory product page.

]]>
<![CDATA[Come see Duo at Identiverse 2025]]> tkietzman@duo.com (Ted Kietzman) https://duo.com/blog/come-see-duo-at-identiverse-2025 https://duo.com/blog/come-see-duo-at-identiverse-2025 Industry Events Mon, 02 Jun 2025 00:00:00 +0000

Identiverse 2025 is this week in Las Vegas, and the Duo team couldn’t be more excited to engage with the brightest minds in identity and access management (IAM). From June 3–6, 2025, the identity community will gather in Las Vegas to share groundbreaking innovations, critical insights, and strategies for addressing today’s identity challenges. And this year, Duo is showing up in a brand-new way.

That’s right, Duo has launched a directory, completing the set of functionalities required to be the only security-first IAM solution. As a part of this launch, we’re also delivering our deployable approach to end-to-end phishing resistance—the most robust way to defend against today’s identity-based attacks.

We’re thrilled to showcase how our new security-first IAM solutions are transforming identity management. Identiverse 2025 is your chance to learn about our cutting-edge capabilities, connect with our experts, and see how Duo is reshaping the future of IAM.

Here’s a preview of what we have planned this week at Identiverse 2025:

How Identity Resilience Will Improve Your Worst Day on the Job

When: Thursday, June 5th at 8:30 AM
Where: Oceanside
Speaker: Matt Caulfield, VP of Product, Duo & Identity, Cisco Systems

What happens when everything goes wrong? In his keynote, Matt Caulfield delves into the challenges IAM professionals face on their “worst day” and offers actionable strategies to build resilience into identity systems. With resilience becoming a critical aspect of identity, this session will reveal how to go beyond the buzzword and make resilience a reality.

Masterclass: Defining (and Using) Maslow's Hierarchy of Identity Risk

When: Wednesday, June 4th from 11:40-12:30 PM
Where: Breakers H
Speakers: Didi Dotan, Director of Engineering, Cisco Identity Intelligence; Alex Zaslavsky, Data Scientist, Cisco Identity Intelligence

Learn how to categorize and address identity risk using a framework inspired by Maslow’s Hierarchy of Needs. Didi and Alex will share practical recommendations for grouping, addressing, and remediating identity risks.

IAM Built for the Imposter Era

When: Wednesday, June 4th from 2:00-2:25 PM
Where: Mandalay Bay D
Speaker: Chris Anderson, Duo Product CTO

Discover how Duo’s security-first approach to IAM tackles the challenges of today’s "imposter era." Chris Anderson will share strategies for reducing complexity and costs while enabling frictionless access and identifying imposters.

Achieve the Impossible: End-to-End Phishing Resistance That's Actually Deployable

When: Thursday, June 5th from 2:00-2:25 PM
Where: Mandalay Bay D
Speakers: Karianne Butler, Director of Duo Product Management; Ted Kietzman, Duo Product Strategist

End-to-end phishing resistance might sound like a pipe dream, but Duo is making it achievable. Karianne and Ted will unpack the hurdles organizations face in adopting phishing-resistant MFA and share deployable solutions that protect every step of the identity workflow.

"How do I...?" Answering Common Passkey Questions from Relying Party Devs

When: Friday, June 6th from 9:40-10:05 AM
Where: Mandalay Bay I
Speaker: Matthew Miller, Passwordless Technical Lead, Cisco Duo

A must for developers navigating FIDO2-based authentication, this session features Matthew Miller will addressing common passkey implementation questions and explores exciting new features in WebAuthn L3.

Be sure to stop by Duo Booth #501 in the exhibit hall to meet our team, see live demos of our new IAM capabilities, and learn how Duo delivers a security-first solutions that frustrate attackers—not your users.

If you're a current Duo customer, reach out to your account team to schedule one-on-one meetings with our product and engineering executives on-site. We’d love to hear your feedback and discuss how Duo can support your identity security needs.

Identiverse 2025 isn’t just an opportunity to hear about the latest trends in identity—it’s a chance to connect with the global IAM community and explore the future of identity security. Duo’s presence at this year’s conference reflects our commitment to driving innovation and empowering organizations to defend against today’s most sophisticated identity-based threats.

Whether you’re interested in attending our keynote, diving into one of our sessions, or connecting with us at the booth, we’d love to see you there. Let’s work together to build a more secure and resilient identity future!

]]>
<![CDATA[Meet the new Duo IAM]]> mcaulfie@cisco.com (Matt Caulfield) https://duo.com/blog/meet-the-new-duo-iam https://duo.com/blog/meet-the-new-duo-iam Product & Engineering Wed, 28 May 2025 00:00:00 +0000

Identity is under siege. Sixty percent of all Cisco Talos IR cases in 2024 saw identity as a key component of reported attacks. Organizations are facing relentless challenges in keeping their systems secure. As attackers grow more sophisticated, traditional Identity and Access Management (IAM) providers have fallen short, leaving critical gaps in their defenses.

At Duo, we’ve been watching this unfold, and honestly, we’ve had enough. That’s why we’re proud to announce that Duo is officially expanding into the IAM market, bringing our trusted security expertise to an area long overdue for disruption.

Traditional IAM providers have historically prioritized business enablement over robust security, resulting in clunky, costly, and inefficient solutions that are difficult to deploy and vulnerable to identity-based attacks. Duo’s new IAM solution changes the game by being security-first, easy to use, and built to frustrate attackers—not your users.

For too long, defenders have focused solely on login protection with multi-factor authentication (MFA). While that’s a critical step, attackers have learned to adapt, finding new ways to bypass traditional defenses. AI significantly exacerbates the situation by amplifying the scale, speed and sophistication of account takeover attacks, enabling automated and highly adaptive social engineering techniques. This creates a real identity crisis.

Duo’s IAM solution rises to this challenge by now offering end-to-end phishing resistance as a core feature, delivered right out of the box.

This experience includes innovative features like:

  • Proximity Verification: A new, easy-to-deploy form of phishing-resistant MFA that is designed to protect against adversary-in-the-middle attacks.

  • Complete Passwordless: Eliminating passwords from enrollment and fallback, so users never have to rely on outdated, insecure credentials.

  • Seamless Help Desk Verification: A new tech partnership enabling identity verification for help desks, safeguarding against social engineering attacks.

With Duo, organizations unlock a deployable, seamless experience for end users, ensuring the highest level of security while maintaining simplicity and ease of use.

At Duo, we believe protecting identity workflows isn’t enough. Organizations also need tools to continuously monitor and respond to changes in identity risk. That’s why we’ve introduced Identity Intelligence, which provides:

  • Comprehensive Visibility: Gain insights across your identity ecosystem, including on-premises, legacy, and non-human systems.

  • Proactive Security Insights: Stay ahead of risks with actionable recommendations.

  • Dynamic Risk Assessment: A distilled User Trust Level dynamically informs access decisions and accelerates threat detection across the Cisco Security stack.

And the best part? This functionality works with any identity stack, giving organizations the flexibility to enhance their existing systems—whether or not Duo IAM is the primary component.

We understand that identity isn’t exactly a new space. Every organization has some sort of existing identity infrastructure. That’s why we’ve built our solution to be flexible. For example, some of our preview customers run Duo IAM as a secondary directory for their contractors and third parties. We’ve also had customers place Duo “in-front” of their existing IAM stack as an “identity broker” enabling consistent, phishing-resistant, passwordless policy for their workforce, even with multiple backend identity providers from other vendors. Our robust user directory and identity routing engine make this possible.

For organizations ready to make the leap to a fully secure identity infrastructure, Duo now offers everything you need in one place. With Duo Directory, you can easily sync users and attributes with external sources and then leverage our popular SSO and MFA capabilities to provide seamless access management.

We’ve also made migration simple with tools like Routing Rules and an AI Assistant to help organizations transition without disruption. Whether you’re integrating Duo into your current stack or building from scratch, our solution is designed to make security effortless.

Duo’s expansion into the IAM market isn’t just about addressing the failures of traditional providers—it’s about doubling down on our commitment to an “identity-first” approach to zero trust. By integrating seamlessly with the broader Cisco Security ecosystem, Duo ensures organizations can protect their users, data, and systems with the most advanced tools available.

The days of weak identity defenses and clunky IAM systems are over. With Cisco Duo, organizations finally have a partner that prioritizes security without compromising usability. Together, we can defend against identity-based threats and make the digital world safer for everyone.

Are you new to Duo? Sign up for a free trial today!

Are you an existing Duo customer? Duo's IAM is now available for all customers.

]]>
<![CDATA[No Agent Required: Duo & Microsoft Edge for Business improve device trust]]> sgrebe@duo.com (Scott Grebe) https://duo.com/blog/duo-microsoft-edge-for-business-improve-device-trust https://duo.com/blog/duo-microsoft-edge-for-business-improve-device-trust Product & Engineering Wed, 30 Apr 2025 00:00:00 +0000

One of the key tenets of a zero trust security strategy is verifying a user’s identity before they’re granted access to network resources. Another important tenet is device trust. Does the device have a healthy security posture? Is the endpoint one that we “know” whether it’s company-issued or someone’s personal device?

It’s with this latter question in mind that Cisco Duo is excited to announce an extension of our partnership with Microsoft. Together, we’re introducing the Microsoft Edge Device for Business Trust Connector (DTC), a native integration between the Edge for Business browser and Duo Trusted Endpoints. The integration identifies trusted endpoints through the managed Edge for Business browser so you can control application access and enforce browser-based protections without installing an agent on the endpoint.

"We are thrilled to announce the integration of Cisco Duo Trusted Endpoints with Microsoft Edge for Business. This collaboration empowers our mutual customers to extend the reach of their security investments, offering robust and seamless browser protection without the need for additional agents. As the browser has become a vital tool for work, we look forward to building even greater capabilities together."
Arunesh Chandra, Principal Product Manager, Microsoft

Increasingly, organizations are moving to hybrid environments. This means you may need to support flexible work patterns (remote and in-office), different device types (company-issued and personal), or a varied workforce (employees, contractors, etc.). You also face aggressive cybersecurity threats, rising expectations to protect sensitive information, and the need to stop unauthorized AI use. Central to these concerns is the web browser which often serves as the primary gateway to your corporate resources and AI.

The new Duo Trusted Endpoints integration with Microsoft Edge for Business enhances security in hybrid work environments. It addresses cybersecurity threats caused by stolen credentials and protects sensitive information by verifying trusted devices within Microsoft Edge for Business. When the browser is managed by the Edge management service, the integration allows Microsoft to assert a device's trust and share its status with Duo, which then incorporates device trust into the authentication process, verifying user and device security. By identifying trusted endpoints, you’re able to restrict application and resource access to only those devices you know through a Trusted Endpoints policy.

Diagram showing how Microsoft Edge for Business and Duo Trusted Endpoints work together for secure authentication.

In addition to greater security, your users also get a better experience. Organizations often require employees to install an agent on their endpoint to identify if the device is managed. This doesn’t always go over well with employees, especially if it’s a personal device. By establishing trust through the Edge for Business browser, the Device Trust Connector removes the need for users to install an endpoint agent. It’s a win-win.

The Device Trust Connector integration provides some great benefits. Let’s take a look:

  • Simplified security: Easily verify users are interacting with a trusted Microsoft Edge for Business browser

  • Agentless data collection: Remove the need for an endpoint agent by collecting and sharing device trust signals through the Edge for Business browser

  • Support for hybrid environments: Create a Trusted Endpoints policy that supports company-issued, shared, and personal Bring Your Own (BYO) devices

  • Conditional access control: Allow application access only from known, trusted devices, while blocking access from unknown, untrusted endpoints

  • Simple setup and management: The Device Trust Connecter is an out-of-the-box integration, making administration fast and easy via the Duo Admin Panel

Duo makes it easy to extend and enhance security by verifying trust in every device, whether corporate or personal, without an installing agent through the Microsoft Edge for Business Device Trust Connector. Trusted Endpoints is available to Duo Essentials, Advantage, and Premier edition customers at no additional charge.

To get started setting up the integration, read our Microsoft Edge for Business Device Trust Connector documentation. You can also watch our Duo + Microsoft Edge for Business Device Trust Connector demo.

Finally, visit our Cisco Duo + Microsoft partner page to learn more about Duo’s partnership with Microsoft and how it benefits customers.

]]>
<![CDATA[Introducing Duo Wear: Seamless MFA from your wrist!]]> dykite@cisco.com (Dylan Kite) https://duo.com/blog/duo-wear-seamless-mfa-from-your-wrist https://duo.com/blog/duo-wear-seamless-mfa-from-your-wrist Industry News Thu, 24 Apr 2025 00:00:00 +0000

We’re thrilled to announce Duo Wear, a companion app for Duo Mobile that brings fast and easy multi-factor authentication (MFA) to your Wear OS smartwatch!

Duo Wear is an app designed specifically for Wear OS smartwatches. It works together with the Duo Mobile app on your Android phone. With Duo Wear, you can:

  • Generate One-Time Passcodes (OTPs) — Type passcodes in your login prompt without ever opening your phone.

  • Answer Duo Push Notifications — View information about your login attempt and approve or deny login requests.

  • Answer Verified Duo Push Notifications — Effortlessly enter Verified Duo Push codes using a wearable-first user interface.

It’s quick, simple, and offers a frictionless authentication experience.

Wearables are a growing component of our technological lives. In 2023 alone, the Wear OS userbase grew by 40% thanks in part to the beautiful hardware and powerful technology of devices like Pixel and Samsung Galaxy watches. As our reliance on smartwatches grows, so do our expectations of what they can do. We make payments, navigate our towns, and message our friends right from our wrists—why not protect our log ins too?

Our customers made it clear: you want a world-class wearable authentication experience and at Duo, we couldn’t agree more.

When it comes to logging in, we want a frictionless experience and when secured with a pin or passcode, Duo Wear delivers—no more stalking through rooms or rifling through your bag to unlock your phone for login. A quick tap on your smart watch and you can verify your identity.

With Duo Wear, enabling Google Smart Lock is no longer necessary—meaning there’s no added vulnerability when using your smart watch to login.

Setting up Duo Wear is simple:

  1. Ensure your Wear OS smartwatch is connected to your Android phone

  2. Make sure you have Duo Mobile version 4.83.0 or higher on your Android phone

  3. Download Duo Wear on your Wear OS smartwatch

  4. Open Duo Wear to enable watch notifications and set a device pin if needed

Welcome to the future of authentication, right on your wrist!

]]>
<![CDATA[5 key criteria for choosing the perfect MFA solution for your business]]> sgrebe@duo.com (Scott Grebe) https://duo.com/blog/key-criteria-for-choosing-the-perfect-mfa-solution-for-your-business https://duo.com/blog/key-criteria-for-choosing-the-perfect-mfa-solution-for-your-business Industry News Wed, 23 Apr 2025 00:00:00 +0000

"Ninety-nine percent of attacks can be blocked with multi-factor authentication (MFA)” is an oft-discussed quote from 2019. Since then, MFA has since become a necessary defense for any cybersecurity strategy to defend against attacks.

But times change, and what solved our challenges in the past doesn’t necessarily work today, at least not in the same form. Attacks have evolved. New threat types such as push-bombing, social engineering, and spear phishing are forcing organizations to do more than rely on MFA alone. To stay protected, you need to increase the effectiveness of your MFA with powerful next-generation capabilities such as passwordless, risk-based authentication, adaptive access policies, and identity visibility tools. But with so many MFA solutions available, how do you identify the one that best suits your organization?

In our MFA Buyer’s Evaluation Guide, we go in depth on the five key criteria you should look for in any security solution.

  • Security Impact — The most critical security aspects of an authentication solution are how effective it is against threats related to credential theft and account takeover as well as its underlying security and reliability. If the primary goal is to reduce the risk of a breach and a solution is easily bypassed or doesn’t provide comprehensive protection that keeps up with and responds to new and changing threats, it’s not worth implementing.

  • Strategic Business Initiatives — Consider how MFA integrates with your business initiatives, both now and in the future. This includes legacy systems, bring your own device (BYOD), remote work, and the adoption of cloud applications. Another business driver to consider is compliance regulation requirements, which can vary by industry and location.

  • Total Cost of Ownership (TCO) — TCO is everyone’s favorite topic. It’s another way of saying, “What’s this really going to cost me?” Total cost of ownership includes all direct and indirect costs of owning a product. For an MFA solution, that can include hidden costs such as upfront capital, licensing, support, maintenance, and other unforeseen expenses over time, like professional services and ongoing operation and administration costs.

  • Time to Value — Another favorite topic is time to value, something we like to call time to security. Time to value refers to the time spent implementing, deploying, and adapting to the solution. Determine how long it takes before your company can start realizing the security benefits of an MFA solution. This is particularly important if you ever experience a breach or security incident.

  • Required Resources — You’ll want to consider the time, the personnel, and any other resources required to integrate your applications, manage users and devices, and maintain your solution. Your MFA provider should be able to tell you what they cover and where you need to fill in the gaps.

With the increase in attacks targeting your users’ identities, you also want to look for a solution that delivers identity security. According to a report from Cisco Talos, Cisco’s threat intelligence and research organization, in the last year, 80% of breaches leverage identity as a key component. So, when you’re evaluating MFA solutions, make sure you look into their identity security capabilities so you can protect against threats designed to steal your users’ identities and then use those credentials to launch attacks that can lead to a breach.

Now that we’ve identified the criteria to evaluate in an MFA solution, let’s take a look at how Duo can help you achieve modern protection without getting in the way of your users:

  1. Security Impact

    Duo protects access to all your apps including enterprise cloud apps, on-premises and web apps, and custom apps that use SAML or OIDC. Pretty much any app you can think of. Duo passwordless reduces your reliance on passwords, improves user experience, reduces IT overhead, and strengthens security posture.

    Duo Risk-Based Authentication takes baseline authentication behavior and evaluates contextual signals to dynamically adjust authentication requirements in real time. With Duo and Cisco Identity Intelligence, you can detect identity-based risks from all your identity sources—identity providers, HR and ticketing systems, and more—to take the right remediation action. You can also identify gaps in MFA coverage, dormant accounts, and privilege creep to reduce the risk of a breach.

  2. Strategic Business Initiatives

    Achieving the initiatives that drive your organization forward is critical to its success. Moving to the cloud? Duo is built on a scalable, cloud-based platform that requires minimal setup and removes costly maintenance. Need to lock down application access to only managed devices or allow access from personal devices with a bring your own device (BYOD) policy? Duo Trusted Endpoints lets you do both.

    With Duo Passport, you can provide a secure and seamless sign-in experience that increases workforce productivity and lowers the administrative burden for IT. Duo can also help meet compliance requirements and regulatory framework guidelines such as PCI, HIPAA, GDPR, NIST, and others.

  3. Total Cost of Ownership (TCO)

    Duo makes it easy to understand the full cost of acquiring an MFA solution. We offer a simple subscription model priced on a per user basis, billed annually, with no extra fees for new devices or applications. With Duo MFA, you get the most value with no hidden costs such as upfront capital, licensing, support, maintenance, operating or other unforeseen expenses over time.

  4. Time to Value

    Duo lets you try before you buy, helping you set up pilot programs before deploying Duo to your entire organization and realizing the value of your investment.

    Quickly add new users through bulk enrollment, self-enrollment, or a directory sync. The Duo Mobile app allows users to easily download the app onto their devices, while a self-service portal also lets them manage their own accounts and devices, reducing help desk tickets and support time.

  5. Required Resources

    Duo integrates with all of your apps with no need for extra hardware, software, or agents. Extensive documentation, APIs, and SDKs make implementation seamless. Because Duo is a cloud-hosted solution, updates are rolled out frequently and automatically to patch for the latest vulnerabilities, so you don’t need to hire a dedicated team to manage the solution.

Regardless of where you are today with your MFA, it’s important to evaluate any solution in the context of these criteria. If you’d like to dig deeper into each criteria, we’ve got more information in the MFA Buyer’s Evaluation Guide.

You can also watch our on-demand webinar, Get Defensive With Your MFA, as well. Remember, times change, and threats evolve, so your MFA solution should as well.

]]>
<![CDATA[Duo Desktop: Packed with features to ease MFA and boost security]]> alexro2@cisco.com (Alex Rodriguez) https://duo.com/blog/duo-desktop-packed-with-features-to-ease-mfa-boost-security https://duo.com/blog/duo-desktop-packed-with-features-to-ease-mfa-boost-security Product & Engineering Fri, 18 Apr 2025 00:00:00 +0000

Throughout my career, I've had the privilege of working across several diverse industries. One aspect that consistently captivates me is the unique jargon associated with each role—terminology that often seems bewildering at first. For instance, in the semiconductor industry, "doping" isn't related to any athletic scandal; rather, it refers to altering the electrical properties of silicon. In the pipeline corrosion prevention field—which, believe it or not, is quite real—a "holiday" isn't about taking time off but rather indicates a spot where the pipeline's coating has chipped away, exposing the metal to potential damage. Working with IT administrators, I've learned that "agent fatigue" doesn't relate to a weary CIA operative. Instead, it describes the challenge they face when managing multiple vendors' applications on their organization's devices.

Given the saturated landscape of applications, IT administrators must be discerning about which ones to deploy across their fleet of devices and users. The process doesn't stop at deployment. Administrators also face the ongoing challenge of maintaining these applications and ensuring they operate smoothly within the organization's infrastructure. Additionally, gaining approval from leadership adds another layer of complexity, as they must demonstrate the application's benefits and align it with strategic goals. It's no surprise then that selectivity is crucial, as each application must deliver significant value to justify its integration into their systems.

Understanding these challenges has driven our strategy for building out Duo Desktop, our lightweight client application. To be a contender for prized space on a user's machine, we need to deliver substantial value to our users. For this reason, we have evolved the application from merely providing health checks to incorporating a myriad of features that ease the burden of MFA, enhance security, and offer an additional method of authentication.

Imagine logging into your work device and being able to navigate through all approved web and local applications without the constant interruption of authentication prompts. Duo Desktop with Passport makes this a reality by providing a streamlined login solution that minimizes MFA fatigue. Users enjoy a single, secure login experience, allowing them to move effortlessly across applications, browsers and thin/thick clients while maintaining productivity. Duo keeps your users secure without getting in their way with relentless authentication prompts.

Duo Mobile and Duo Desktop's Proximity Verification offers a powerful defense in the fight against phishing. Utilizing Bluetooth Low Energy (BLE), this feature ensures your devices are nearby when logging in and automatically responds to the push verification without requiring user input. The magic lies in the secure communication between Duo Desktop and Duo Mobile, providing seamless, phishing-resistant authentication.

There are times when a smartphone or hardware token might not be available, and Duo Desktop Authentication is ready to fill that gap. It allows for secure authentication directly from your laptop or desktop, ensuring you're always equipped for secure access, regardless of the situation. It’s a straightforward solution that simplifies authentication, making security accessible and reliable.

Security needs can vary greatly depending on context, and Duo's Risk-Based Authentication adapts to this reality. By assessing risk levels in real time, it tailors authentication requirements based on user context, location, and device proximity. This means you get a higher level of security without compromising user experience. It's dynamic security at its finest, ensuring protection while keeping the process smooth and user-friendly.

Maintaining the security of your devices is a continuous process, and Duo Desktop's Health Checks are here to help. This feature acts like a vigilant guardian, continuously assessing your device's security posture. It checks critical elements such as your OS version and patch level, password protection, disk encryption, firewall status, and security agents. By ensuring your devices meet security standards, Health Checks play a pivotal role in protecting access and maintaining compliance, giving you peace of mind.

Duo's Trusted Endpoints feature identifies and verifies devices that are owned or managed by the organization, effectively blocking access from untrusted endpoints, like unmanaged devices with poor security or devices used by an attacker. This proactive approach ensures that your resources are safeguarded against unauthorized access, providing a robust layer of security. This can be really helpful in scenarios where users have limited access to advanced second factors or are at greater risk to MFA phishing attacks.

Duo Desktop has been thoughtfully designed to provide substantial value that earns its place on users' devices. With advanced features like easy MFA and strong security, it simplifies management and fits right into your strategic goals. As you consider the applications that will best serve your organization, count on Duo Desktop to be the reliable partner that not only meets your needs but goes above and beyond. We're dedicated to constantly improving Duo Desktop, ensuring it remains the top choice for IT admins by making deployment and maintenance as simple as possible.

]]>