Connect with Duo users and security professionals in our Community.
Can't find what you're looking for? Contact Sales or Contact Support.
← Back to Index
A policy permitting employees to carry personal devices into their work environment for business use.
BYOD Risks Obviated by Two-Factor Authentication
The Evolution of Security #8: Cloud & BYOD (Bring Your Own Device)
The New Risks to Retail: Bring Your Own Device & Cloud Services
The 2016 Duo Trusted Access Report
An in-depth analysis of the security health of millions of devices and what kind of risk they bring to companies, based on Duo’s dataset of two million devices worldwide.
Case Study: Cole, Scott & Kissane
How Utah State University is Solving its Toughest Security Challenges
Meet Duo's New SSO
Device Access Policies
Trusted Devices is part of a complete Trusted Access solution. Duo’s endpoint security software ensures only the most up-to-date devices can access your applications.
Security starts with transparency. Duo gives you complete visibility into both managed and unmanaged devices that authenticate into your applications.
It only takes one device to put your entire company at risk. Duo checks the security health of your devices before they access your applications - Trusted Devices is part of a complete Trusted Access solution.
Trusted Devices and Networks
Give your users fast, secure access by designating trusted devices and networks.
User and Device Reports
Get detailed reports and analytics about your users and devices, all without the use of an agent.
The 2016 Duo Trusted Access Report: The Current State of Device Security Health
The current state of device security health in an increasingly cloud, mobile and BYOD-enabled world. This report details findings about the security health of our users’ devices.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!