Skip navigation
DEVICE ACCESS POLICIES

Strong Endpoint Security

Ensure only the most up-to-date and healthy devices can access your applications. Trusted Devices is part of a complete Trusted Access solution.

Security Starts With Transparency

It’s not always easy to gain visibility into both corporate-owned and personal user devices on your network.

That’s why we’ve made it easy to see what devices are being used to access your enterprise applications with extensive user and device reports, available through Duo’s Admin Panel.

Duo’s Device Insight collects and analyzes data about your devices, including software versions, enabled security features and jailbroken or rooted status so you can identify any risky devices before they become a problem.

Protect Against Known Vulnerabilities

With this data, you can create custom access policies based on different parameters to fit your security needs. For example, you can block any devices running an older version of Flash or Internet Explorer from accessing your applications.

You can protect against vulnerabilities that exploit known software flaws on your users’ risky devices to install malware or get access to company applications by automatically blocking them with Duo’s Endpoint Remediation.

Block Untrusted Endpoints

Secure critical applications and data by restricting access only to corporate devices. Duo detects if an unmanaged device without a Duo certificate is attempting to access a sensitive application and stops it in its track. It even explains to an end user why they’re being blocked.

Close Security Gaps

Gain faster time to security by notifying and enabling your users to update their own out-of-date devices at login with Duo’s Self-Remediation, saving administrator time and resources.

By prompting your users to update, you can close security gaps faster and protect against known vulnerabilities.

Fast, Secure Access

With Duo’s Trusted Devices and Networks, you can give your users faster access without compromising security. Similar to a “Remember my computer” option, you can designate users’ devices and networks as trusted to allow your users to log in without completing the two-factor process each time.

By flagging trusted networks with listed IP addresses or CIDR blocks, you can develop strong authentication policies for web-based access to company services.

Trusted Access

Duo's Trusted Access ensures only Trusted Users and Trusted Devices can access protected applications.

This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.

  • “As a result of the extensive search for a comprehensive solution, Duo has emerged as a product that offers comprehensive solution, seamless integration and excellent customer support.”

    — Natalia Kory, Chief Technology Officer, Clarient
  • “One thing that comes to mind when I think of Duo is ‘peace of mind.’ I know that only authorized personnel are accessing our servers and services, which is priceless.”

    — Ramesh Sivaraman, Senior System Administrator, G4S

Ready to Get Started?

Try out Duo Access for 30 days to experience Trusted Access.