Home
| User | Application | Factor | Result | Time |
|---|---|---|---|---|
| angela.ro@example.com | Duo Admin Panel | Roaming authenticator (2fa) | Success | Apr 21, 6:12 PM |
| jsmith@example.com | Cisco VPN | Duo Push | — | — |
| mlee@example.com | Workday SSO | TOTP | — | — |
Make your Duo Premier edition as secure as possible
Users juggling multiple credentials often resort to weak passwords or reuse. For IT, managing disparate login points makes it difficult to audit access or offboard users quickly.
Duo Single Sign-On (SSO) creates a centralized, cloud-hosted gateway. Users authenticate once for instant access to all applications, giving IT a single point of control to enforce security policies.
The majority of help desk tickets and account lockouts are caused by traditional passwords. Frequent reset requests and complex requirements frustrate users and interrupt workflows.
Duo Passwordless replaces passwords with phishing-resistant authenticators like passkeys (Touch ID, Windows Hello, FIDO2) and Duo Push with proximity verification to streamline logins and increase security.
Scattered user data across Active Directory, Azure, and manual lists prevent a single "source of truth." This fragmentation leads to orphaned accounts and inconsistent MFA enrollment.
Duo Directory centralizes user management by syncing with your existing identity providers. It automates the user lifecycle ensuring access is instantly revoked the moment a user is removed from your primary directory.
Limited time and budget often lead to cherry picking which apps to protect. While the VPN might have MFA, tools like payroll and email are left vulnerable. Attackers exploit these forgotten apps to gain a foothold and move throughout the network.
Duo provides unlimited integrations to secure every entry point, from Microsoft 365 to legacy on-prem servers and custom tools, ensuring no windows remain unlocked for an attacker to find.
IT can't secure what it doesn't manage. When employees use personal devices to access corporate data, they bypass the security controls of managed hardware creating a visibility gap and entry point for threats.
Duo Trusted Endpoints identifies the management status of every device, allowing organizations to enforce access policies for sensitive data so only authorized, known devices can connect.
Users are frustrated by repeated authentication prompts when switching between apps or browsers. Meanwhile, traditional session cookies remain a target for attackers and can be used to remotely impersonate users if stolen.
Duo Passport uses Duo Desktop to tie sessions to the device itself, rather than a susceptible cookie. Users authenticate once and Passport securely extends that trust across web and desktop apps, reducing login friction while preventing token theft.
Fragmented identities across cloud and on-prem providers create blind spots. Without a unified view, orphaned accounts, MFA-exempt users, and suspicious privilege escalations go unnoticed until they're exploited in a breach.
Cisco Identity Intelligence correlates identity data across your entire ecosystem to surface high-risk anomalies, like session hijacking or dormant accounts. It provides actionable insights to proactively harden your identity attack surface.
Static security rules lack context. A user logging in from a known office network requires a different level of scrutiny than a user logging in from a new country or an anonymous proxy.
Adaptive access policies enable granular, context-aware rules. You can adjust requirements based on user location, network reputation, and app sensitivity, for the right level of security at every login.
Threats like session cookie theft and MFA bypass techniques often evade static security rules that can't easily detect anomalies like impossible travel or unusual authentication behavior.
Risk-Based Authentication analyzes real-time signals to identify suspicious behavior. Duo secures high-risk logins by automatically escalating to more secure verification methods.
Even a trusted user is a risk if their device is unhealthy. Outdated operating systems, disabled firewalls, or missing screen locks create vulnerabilities to malware and data theft.
Duo Desktop performs automated health checks at login. It blocks access from non-compliant devices and provides users with self-remediation steps, so systems are patched and secured before gaining access.
Traditional VPNs are cumbersome and often grant broad network access by default. Once a single VPN account is compromised, an attacker can move laterally across the entire internal network.
Duo Network Gateway (DNG) provides secure, VPN-less access. It enforces least privilege by granting users access only to the specific internal web apps, RDP, or SSH servers they need—all protected by Duo's MFA and policy engine.
A healthy device is still a liability if the security agents are disabled. If antivirus or endpoint protections are inactive or failing to report, the device is silently exposed to malware and breaches.
Duo Desktop verifies that required security agents, such as Cisco Secure Endpoint or CrowdStrike, are active and running before granting access. If the agent is disabled or missing, access is blocked until protection is restored.
Early access features
Manage early access features for your organization. These features are in development and may change or be removed.
| Feature | Description | Status | Action |
|---|