Determine who can access which applications based on an individual or group, or their specific roles and responsibilities, with Duo’s trusted access solution. Set customized policies based on authentication method on a per-user or per-group basis.
See where users are authenticating from and prevent unauthorized access from any geographic location. Block access from the Russian Federation, North Korea or any other country, for that matter, to thwart access attempts from from any geolocation.
Enforce controls based on the network from which a user is trying to access applications. Duo allows you to grant or deny access based on a set of IP address ranges that you determine.
Block authentication attempts from anonymous networks like Tor. Duo’s trusted access aggregates data about users’ authentication devices and gives you insight into what kind of network they’re authenticating from.
Control which devices can access applications based on hygiene, operating system, browser and plugins; and whether screenlocks and biometrics are enabled, the device is corporate- or employee-owned, or if the devices has been tampered, jailbroken or rooted.
Identify all devices that access your environment, tag them to specific users and understand who owns a device, how many they’re using and what applications they access. Get a comprehensive view and insights of all end-user devices without an MDM.
"[Rolling out Duo] allowed me to own security. All of the insight it gives you, all of the control, how granular the access policies are. It really makes you the owner of security, regardless of what role you’re in.”
— Allen Jeter, Head of IT, Branch