Skip navigation

Security Starts With Transparency

Duo’s device trust capabilities provide data on who’s accessing which company applications, and under what conditions — without requiring any agents on your users’ devices.

Verify Trustworthiness of Every Device

Duo’s Device Insight gives you actionable data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status.

Easily search, filter and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest iOS or Android vulnerability.

Identify Risky Devices

Even a trusted user may be using a mobile device or computer with out-of-date software, leaving them susceptible to vulnerabilities. Duo can automatically flag out-of-date devices based on your security profile, saving your administrators upkeep time and resources better spent on your core business objectives.

Mitigate Vulnerabilities From At-Risk Software

Adobe Flash and Oracle Java have over 500 known vulnerabilities, putting your users’ devices and the company at risk of a data breach.

Duo gives you insight into software use across your organization, so you can see which users and devices run outdated versions of Flash, Java, and more.

Differentiate Managed and Unmanaged Devices

Secure your BYOD environment by differentiating between company and employee-owned devices that access your applications. 

It’s easy to deploy the Duo certificate on your company-issued laptops to mark them as ‘Trusted.’ After that, your Device Insight dashboard will automatically show a breakdown of the trusted (has a Duo certificate) and untrusted (does not have a Duo certificate) endpoints on your network.

Set Device Access Policies

To prevent the spread of malware and stop risky devices from accessing your applications, create custom access policies and controls based on security health profiles. Duo’s Endpoint Remediation allows you to block access based on certain device factors. Closing security gaps starts with keeping devices patched and healthy.

For example, you can block any devices running out-of-date Flash or Java until the user updates their device to the latest software version. That way, you can ensure enterprise applications are protected against all known and reported vulnerabilities.

Cover of The 2019 Duo Trusted Access Report eBook

The 2019 Duo Trusted Access Report

The 2019 Duo Trusted Access Report examines data from nearly 24 million devices, more than 1 million applications and services and more than half a billion authentications per month from across our customer-base, spanning North America and Western...

Get the Free Guide