Skip navigation

Verifying Device Trust with Duo and Microsoft

In this webinar, you will learn:

  • The importance of verifying the device posture before granting application access
  • How you can enforce adaptive access controls based on device risk
  • Best practices for good cyber hygiene without burdening the IT Helpdesk

More than half (52%) of CISOs say that mobile devices are now “very” or “extremely” challenging to defend, according to Cisco’s 2020 CISO Benchmark Report. Device trust for the enterprise often extends beyond just providing secure access for managed devices to hybrid IT environments. The workforce-to-protect continues to expand with remote workers, vendors and contractors all requiring access on-the-go, bringing more third-party devices and BYOD into the network environment. While most organizations have well-defined corporate device policies, handling this mix of managed and unmanaged endpoints can pose a challenge to IT teams.

Microsoft Endpoint Manager, a unified platform including both Microsoft Intune and Configuration Manager, helps organizations address this challenge, and Duo provides the tools needed to verify the trustworthiness of any device before granting application access. Now, through Duo’s collaboration with Microsoft, we have extended our Device Trust capabilities to integrate with Microsoft Intune. That means you can now leverage Microsoft Endpoint Manager and Duo Device Trust to enforce endpoint compliance without burdening your IT Helpdesk.

Join Duo’s Josh Green on 26 August to learn more about why Microsoft and Duo are a better together solution for your device access strategy.

Presenter Info

Josh Green, Enterprise Solutions Engineer

Josh Green is the Solutions Engineer for Duo Security’s London office, providing pre-sales engineering support for organizations of all sizes. He works closely with everyone from CIOs, CISOs, IT Security, IT management and staff on product education, planning and deployment of Duo Security products. Josh has been working in the cybersecurity space for the past 7 years dealing with Identity Management, Vulnerability Management, and Authentication. He speaks 4 languages, and in his spare time, enjoys learning new ones.