Skip navigation

Duo Security is now a part of Cisco

About Cisco

Unified Endpoint Visibility

Security Starts With Transparency

To ensure the security health of your devices, we give you data on who’s accessing what company applications, and under what conditions - without requiring any agents on your users’ devices.

Duo’s Unified Endpoint Visibility gives you actionable data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status.

Easily search, filter and export a list of devices by OS, browser and plugin - refine searches to find out who’s susceptible to the latest iOS or Android vulnerability.

Identify Risky Devices

We also do the work of flagging any out-of-date devices for you, to save administrators time and resources better spent on your core business objectives.

Even a trusted user may be using a mobile device or computer with out-of-date software, leaving them susceptible to vulnerabilities. It only takes one risky device to compromise an entire organization. Knowing this, we will flag risky devices based on your security profile.

Identifying At-Risk Software

Adobe Flash and Oracle Java have over 500 known vulnerabilities - putting your users’ devices and company at risk of a data breach.

Duo gives you insight into which users and devices run outdated Flash or Java versions, and an overview of software use across your organization.

Identify Unmanaged Devices

Secure your BYOD environment by differentiating between company and employee-owned devices that access your applications. It’s easy to deploy the Duo certificate on your company-issued laptops to mark them as ‘Trusted.’

After that, your Unified Endpoint Visibility dashboard will automatically show a breakdown of the trusted (has a Duo certificate) and untrusted (does not have a Duo certificate) endpoints on your network.

Device Access Policies

To prevent the spread of malware and stop risky devices from accessing your applications, create custom access policies and controls based security health profiles. Duo’s Endpoint Remediation allows you to block access based on certain device factors. Closing security gaps starts with keeping devices patched and healthy.

For example, you can block any devices running out-of-date Flash or Java until the user updates their device to the latest software version. That way, you can ensure enterprise applications are protected against all known and reported vulnerabilities.

Trusted Access

Duo's trusted access solution ensures only Trusted Users and Trusted Devices can access protected applications.

This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.

  • “We have seen value in the data we get from Duo regarding authentication sources, as well as now having user device information that was largely opaque to us. Additionally, having the confidence that the plethora of stolen passwords, and the propensity of users to reuse even compromised passwords, will have a reduced impact to our online infrastructure and services.”

    — Thomas Siu, Chief Information Security Officer, Case Western Reserve University
  • “With Duo Security, we are able to provide needed access to critical sites and services without the normal concerns of password theft. The monitoring and alerting has also provided extra insight to potential security issues.”

    — Anonymous, Security Manager, S&P 500 Aerospace & Defense Company

Biometrics Booming! Flash Fizzling! Phishing Floundering!

The 2019 Duo Trusted Access Report: Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce

This year, more customers are using biometrics as an authentication factor to access applications with 77 percent of Duo customers having devices with biometrics enabled. Meanwhile, 71 percent of Duo customers have Flash uninstalled from their devices. And fewer Duo customers are falling for internal phishing simulations – 47 percent of phishing campaigns captured at least one set of credentials and 39 percent involved at least one out-of-date devices, which is an improvement over last year.

Check out all that data and much more in The 2019 Duo Trusted Access Report: Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce.

Download ebook

Ready to Get Started?

Try out Duo Access for 30 days to experience trusted access.