Skip navigation

Simple, Secure Access to All Microsoft Apps

  • Consistent access security for existing Microsoft identities and applications
  • Balance security and usability around protecting application and workstation access
  • Mitigate security risks of devices with device insights and by establishing device trust
  • Augment access controls and provide a streamlined user experience for cloud and on-prem assets

Protect All Microsoft Apps – Cloud and On-Prem

In a cloud application and mobile world, organizations can’t rely on traditional perimeter security architecture to secure access to applications. Protect access to both on-premises and cloud-based Microsoft applications with Duo’s solutions that verify trust for the workforce – the users and devices accessing applications. More than 8,000 organizations trust Duo to simplify access to all their Microsoft applications, including Office 365, Outlook Web App (OWA), Windows desktop, services and more.

Consistent Access Security for Microsoft Identities

Key Benefits:

  • Duo never touches the primary authentication method
  • Diverse authentication options to verify existing user identities
  • Native integration with AzureAD to support cloud adoption

Regardless of where your identity exists today, Duo adds strong authentication options to verify and protect those identities with adaptive access controls, improving overall user productivity. Duo integrates with Microsoft Active Directory (AD) both on-premises and in Azure. This provides seamless integration to protected applications with automatic and self-service enrollment options which result in high user adoption.

Learn about Duo’s Active Directory Sync

It helps us sleep better at night knowing that as we go through some of these public cloud migrations (Exchange and Office 365, on-premises and Azure Active Directory), Duo can stay right there with us without any complications.

Securing Windows Environments

Key Benefits:

  • Secure access to Remote Desktop logins
  • Secure online/offline access to desktop logins
  • Ensure connecting devices are healthy and up to date

Whether you’re running your hosted desktop applications on-premises or planning to move those workloads to the cloud, you need a simple solution to secure your Remote Desktop and local logons. Duo integrates with Microsoft Windows client and server operating systems to add two-factor authentication to logins with a solution that balances security and usability. Access policies can be configured to block access to sensitive remote workstations from devices that are unmanaged or out of date.

Learn about Duo for RDP/Windows Servers and Duo for RDS (RDGateway, RDWeb).

Protecting Productivity Applications

Key Benefits:

  • Secure access to Exchange and Office 365 deployments
  • Enforce role and device-specific policies
  • Supports all platforms

While moving from on-premises Exchange infrastructures to cloud workloads in Microsoft’s Office 365, you may be left vulnerable to attacks against your corporate emails and data. With Duo’s access controls you can set granular policies to protect your most sensitive assets.

Duo Beyond has proven to be one of those rare solutions that both improves the security of our company while simultaneously being easier for our employees to use.

Mitigate Security Risk of Devices and Augment Access Controls

Key Benefits:

  • Enhanced multi-factor authentication
  • Role-based access
  • Insights into device hygiene and establish device trust

Duo’s native integration with Azure AD Premium policies lets you strengthen security by complimenting Azure Conditional Access.

For some organizations, Active Directory Federation (AD FS) is a pivotal component of bridging together all different AD deployments within an organization and providing consolidated access. Duo easily integrates with Microsoft AD FS to provide role-based access into any corporate application.

Without requiring any additional agents, Duo’s device insights and trusted endpoint solutions allow organizations to ensure the health of the devices connecting to critical applications and provides the ability to block unknown devices, improving overall security within their organization.

Because we are BYOD, I can’t control that device, but I can have insight into versions, apps, etc., which is very important for us.