Skip navigation

The 2016 Duo Trusted Access Report: Microsoft Edition

In this report, we cover:

  • How out-of-date software can increase the likelihood of a potential data breach
  • An analysis of Duo’s dataset of enterprise Window devices and Microsoft applications, including how many are out-of-date and insecure
  • Duo’s security recommendations on securing your organization with Trusted Access, a holistic security platform

A New Era of Access

The traditional security perimeter no longer exists – data and applications are stored in hybrid environments in the cloud and on-premises. Users are bringing their own devices to work, making it a challenge for administrators to maintain insight and control.

Out-of-date devices are at greater risk of exploitation, as they’re susceptible to known software vulnerabilities that can allow attackers to compromise them.

This report helps you understand what devices are at risk, and how you can mitigate the risk.

An Analysis of Microsoft Devices

This report focuses on Windows devices, shedding light on the 63% of the devices that are running the Microsoft operating system.

We take a closer look at the adoption rate and out-of-date versions of Microsoft browsers, including Internet Explorer and Edge, and plugins like Flash and Java. Finally, we provide an analysis of the different industries using Microsoft applications, including the most popular integrations with Duo’s service.

Securing Hybrid Environments

Duo’s Trusted Access platform can be used to protect every application in a hybrid environment – both Microsoft on-premises and cloud-based services during the migration.

We do this by verifying the identities of your users and checking the security health of their devices before granting them secure access to applications, ensuring Trusted Users and Trusted Devices for Every Application.

Preview the ebook: