With Duo’s Unified Endpoint Visibility, you can see, track and report on all end user devices from a single dashboard. Duo's user and device reports give admins actionable data on user behavior and risky devices, while deployment and authentication reports let you track admin progress. Our detailed user, admin and telephony logs let you search or easily integrate with SIEM systems.
With Duo’s actionable data on platforms, systems and security status, you can easily refine searches to find vulnerable endpoints. Notify, warn and/or block users from accessing your applications until they update their devices with Duo’s Self-Remediation and Endpoint Remediation. Duo also flags devices as tampered, indicating devices that have been rooted, jailbroken or have failed SafetyNet checks.
Get a breakdown of corporate-managed and personal devices accessing your applications, and enforce policies based on device type. Duo's Trusted Endpoints lets you issue device certificates that are checked at login for greater insight into and control over your BYOD environment, while limiting access by any personal devices that don’t meet your security requirements.
Duo puts the power in end users' hands, giving them the ability to update their own devices to reduce risk. Duo’s self-service portal makes it easy for end users to manage and secure their own devices. And Self-Remediation notifies and assists users to update any out-of-date devices. Duo’s Security Checkup feature, available via the Duo Mobile app, provides a security score of users' devices and notifies users to maintain the security hygiene of their mobile devices via Duo Mobile.
Secure employees’ personal, non-corporate managed devices without mobile device management (MDM). With Duo Mobile for Trusted Endpoints you can block devices from accessing your applications based on OS, browser and plugin versions and how long they’ve been out of date; status of enabled security features (configured or disabled); full disk encryption; mobile device biometrics (Face ID/Touch ID); screen lock or tampered (jailbroken, rooted or failed Google’s SafetyNet).
“The only way we knew to get insights into mobile devices was to push a mobile device management (MDM) tool onto user’s devices, but due to cost and complexity we didn’t want to pursue this idea.”
— Chad Spiers, Director of Information Security, Sentara Healthcare