Duo Security is now a part of Cisco
Try Duo's Unified Access Security solution now.
← Back to Index
The process of verifying the credentials of a user, device, or action, as well as the origin and integrity of data.
What’s a Secure Mobile Authentication?
One-time passwords can be used as a second factor in two-factor authentication, but they can be easily compromised by...
Two-Factor Authentication Evaluation Guide
Modern Two-Factor Authentication: Easy. Affordable. Secure.
Why Use Two-Factor Authentication?
Passwords alone can’t prevent account takeover. By combining another factor - something you have - you can add...
Two-factor authentication methods that fit the unique needs of your diverse user base, for every login scenario - from offline to temporary or limited access.
Authentication Method Controls
Customize the type of methods your users can use to authenticate into your company applications, including Duo Push, U2F, USB devices, security keys, phone callback and more.
Two-Factor Authentication (2FA)
Protect against phishing, stolen or weak passwords, and other user-centric threats with Duo's strong, adaptive two-factor authentication.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!
By providing your contact details, you are confirming that we may contact you and that you have read and understand our General Privacy Notice