Skip navigation

Strong Endpoint Security

Ensure only the most up-to-date and healthy devices can access your applications.

Image of a duo dashboard showing browsers used are either up to date and out of date

Security Starts With Transparency

To truly protect every application, visibility is critical. Duo provides insight into every device that's accessing your information — whether it's a personal device or corporate-owned. You can access that information easily and at any time with extensive user and device reports, available through Duo’s Admin Panel.

image of the device insights notification for admins showing statistics for flash devices usage

Protect Against Known Vulnerabilities

Using Duo's logs, reports, or Trust Monitor events, you can create custom access policies based on different parameters to fit your security needs. For example, with Duo's privileged user control, you can block any devices running an older version of Flash or Internet Explorer from accessing your applications.

You can also protect against vulnerabilities that exploit known software flaws on your users’ risky devices to install malware or get access to company applications by automatically blocking them with Duo’s Endpoint Remediation.

Block Untrusted Endpoints

Secure critical applications and data by restricting access only to corporate devices. Duo has the ability to detect if a device is unmanaged and is attempting to access a sensitive application. Duo can then enforce access controls and will explain to an end user why they’re being blocked.

Fast, Secure Access

With Duo’s Trusted Devices and Networks, you can give your users faster access without compromising security. Similar to a “Remember my computer” option, you can designate users’ devices and networks as trusted to allow your users to log in without completing the two-factor process each time.

Image showing a user checking device compliance and what needs to be be fixed to stay secure and in compliance

Close Security Gaps

Gain faster time to security by notifying and enabling your users to update their own out-of-date devices at login with Duo’s Self-Remediation, saving administrator time and resources.

By prompting your users to update, you can close security gaps faster and protect against known vulnerabilities.

Streamline Authentication

Designate certain devices and networks as trusted, giving your users faster and more secure access.

Remembered Devices

Trust your users’ computers after initial authentication, and let users log into your applications without completing two-factor authentication each time.

Trusted Networks

By flagging trusted networks with listed IP addresses or CIDR blocks, you can develop policies to require strong authentication for certain web-based access to company services.

Image of a Duo message admins will receive on selections for remembering devices while managing Duo