It’s not always easy to gain visibility into both corporate-owned and personal user devices on your network.
That’s why we’ve made it easy to see what devices are being used to access your enterprise applications with extensive user and device reports, available through Duo’s Admin Panel.
Duo’s Device Insight collects and analyzes data about your devices, including software versions, enabled security features and jailbroken or rooted status so you can identify any risky devices before they become a problem.
With this data, you can create custom access policies based on different parameters to fit your security needs. For example, you can block any devices running an older version of Flash or Internet Explorer from accessing your applications.
You can protect against vulnerabilities that exploit known software flaws on your users’ risky devices to install malware or get access to company applications by automatically blocking them with Duo’s Endpoint Remediation.
Secure critical applications and data by restricting access only to corporate devices. Duo detects if an unmanaged device without a Duo certificate is attempting to access a sensitive application and stops it in its track. It even explains to an end user why they’re being blocked.
Gain faster time to security by notifying and enabling your users to update their own out-of-date devices at login with Duo’s Self-Remediation, saving administrator time and resources.
By prompting your users to update, you can close security gaps faster and protect against known vulnerabilities.
With Duo’s Trusted Devices and Networks, you can give your users faster access without compromising security. Similar to a “Remember my computer” option, you can designate users’ devices and networks as trusted to allow your users to log in without completing the two-factor process each time.
By flagging trusted networks with listed IP addresses or CIDR blocks, you can develop strong authentication policies for web-based access to company services.
This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.
“As a result of the extensive search for a comprehensive solution, Duo has emerged as a product that offers comprehensive solution, seamless integration and excellent customer support.”
“One thing that comes to mind when I think of Duo is ‘peace of mind.’ I know that only authorized personnel are accessing our servers and services, which is priceless.”