Duo Security is now a part of Cisco
Try Duo's trusted access solution now.
← Back to Index
A record of entities, such as users, IP addresses, or countries, that are blocked or denied privileges or access. Implementing these precise controls over who can gain entry to a network increases the chances of keeping out remote attackers.
How to Block Access by Country
Blocking Authentication Attempts from Anonymous Networks
The 2016 Duo Trusted Access Report: Microsoft Edition
The Essential Guide to Securing Remote Access
Device Access Policies
Trusted Devices is part of a complete Trusted Access solution. Duo’s endpoint security software ensures only the most up-to-date devices can access your applications.
Prevent risky devices from accessing your enterprise applications with Duo’s Endpoint Remediation, a device access policy that ensures Healthy Devices as part of a complete Trusted Access solution.
User Access Policies
Contextual user access policies to enable adaptive authentication give you the ability to gain greater control over who can access your applications.
With Duo’s Trusted Endpoints, you can secure BYOD and protect access to your applications with device access policies and device certificates.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!
By providing your contact details, you are confirming that we may contact you and that you have read and understand our General Privacy Notice