Skip navigation
Device Insight

Security Starts With Transparency

To ensure the security health of your devices, we give you data on who’s accessing what company applications, and under what conditions - without requiring any agents on your users’ devices.

Duo’s Device Insight gives you actionable data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status.

Easily search, filter and export a list of devices by OS, browser and plugin - refine searches to find out who’s susceptible to the latest iOS or Android vulnerability.

Identify Risky Devices

We also do the work of flagging any out-of-date devices for you, to save administrators time and resources better spent on your core business objectives.

Even a trusted user may be using a mobile device or computer with out-of-date software, leaving them susceptible to vulnerabilities. It only takes one risky device to compromise an entire organization. Knowing this, we will flag risky devices based on your security profile.

Identifying At-Risk Software

Adobe Flash and Oracle Java have over 500 known vulnerabilities - putting your users’ devices and company at risk of a data breach.

Duo gives you insight into which users and devices run outdated Flash or Java versions, and an overview of software use across your organization.

Device Access Policies

To prevent the spread of malware and stop risky devices from accessing your applications, create custom access policies and controls based security health profiles. Duo’s Endpoint Remediation allows you to block access based on certain device factors. Closing security gaps starts with keeping devices patched and healthy.

For example, you can block any devices running out-of-date Flash or Java until the user updates their device to the latest software version. That way, you can ensure enterprise applications are protected against all known and reported vulnerabilities.

Trusted Access

Duo's Trusted Access ensures only Trusted Users and Trusted Devices can access protected applications.

This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.

  • “We have seen value in the data we get from Duo regarding authentication sources, as well as now having user device information that was largely opaque to us. Additionally, having the confidence that the plethora of stolen passwords, and the propensity of users to reuse even compromised passwords, will have a reduced impact to our online infrastructure and services.”

    — Thomas Siu, Chief Information Security Officer, Case Western Reserve University
  • “With Duo Security, we are able to provide needed access to critical sites and services without the normal concerns of password theft. The monitoring and alerting has also provided extra insight to potential security issues.”

    — Anonymous, Security Manager, S&P 500 Aerospace & Defense Company

The Essential Guide to Securing Remote Access

Ensuring User, Device and App Trust

Ideal for professionals concerned with information security, this guide is for any organization that allows remote access to their environment.

Download the Guide

Ready to Get Started?

Try out Duo's Platform Edition for 30 days to get the full Trusted Access experience.