Skip navigation

The 2016 Duo Trusted Access Report

In this report we cover:

  • A breakdown of how many Mac, Windows and other users and devices are running outdated, unsupported browsers, operating systems, Java and Flash
  • The types of known vulnerabilities your users and company are susceptible to
  • Duo’s security hygiene recommendations to secure your devices, users, apps and data
  • A real-life breach scenario and how a Trusted Access solution can prevent a breach

In an increasingly cloud, mobile and BYOD-enabled world, new threats have evolved - attackers are now targeting outdated devices with known vulnerabilities, and leveraging stolen credentials to gain access to sensitive data. This report helps you understand what types of devices are at risk, and how you can mitigate the risk.

What is Trusted Access?

Outdated devices that connect to your company’s applications and data can introduce the risk of known vulnerabilities, malware and a potential data breach.

Verifying the trust of both users and devices before granting access can eliminate new threats that rely on outdated devices or stolen credentials to compromise your systems. We call this Trusted Access.

A Comprehensive Look at Device Security Health

We analyzed our extensive dataset of more than 2 million devices used by customers in every industry and size, ranging from small startups to Fortune 500 enterprises, to give you top-level insight into what’s secure and what’s not.

Our customers use multiple devices, performing over two million authentications per day using Duo’s two-factor authentication.

How Did We Get This Data?

Our Duo Mobile authentication application collects detailed data on operating systems, browsers, plugins and more via our endpoint visibility feature, Device Insight.

Preview the ebook: