The 2018 Duo Trusted Access Report: Enterprise Remote Access Industry News / Featured Article
Newly released! The 2018 Duo Trusted Access Report analyzes user behavior and the security of over 10.7 million devices and nearly half a billion authentications per month.
Moving beyond the perimeter is about shifting the security focus from network-based to more identity-based (users and devices).
Security forward organizations we have adopted a new analytics-driven threat detection paradigm to hunt down advanced persistent threats (APTs): user and entity behavior analytics (UEBA).
James Barclay and Nick Steele recently shared their thoughts on a passwordless future during a Twitter chat with Yubico. Get their insights on the pain points of passwords, their hopes for the future, and explore some of our resources around industry advancements paving the way, like passwordless authentication, multi-factor authentication and WebAuthn.
Duo Beyond is a user friendly alternative to mobile device management (MDM) solutions that helps businesses secure BYOD.
Unified Endpoint Visibility: Shine a Light on BYOD Product Updates / Featured Article
Duo's Unified Endpoint Visibility helps you better understand your user and endpoint inventory and activity so you can better secure BYOD.
It's not just S3 buckets that are exposed. Duo's security research team found a number of other publicly available Amazon Web Services (AWS) resources, including cloud backup and misconfigured servers.
Stop investing in bolt-on security solutions that need to be ripped out and replaced as you grow, and focus on integrated, scalable and built-in security instead.
Humans Only: Duo Mobile and Android Protected Confirmation Duo Labs / Featured Article
Duo has been working with Google since last year on the Android Protected Confirmation API - a way to verify that only humans are responding to a prompt - and we've prototyped an integration with Duo Mobile to enhance 2FA security.
Going beyond multi-factor authentication (MFA) means adding controls and checks to secure the other harbinger of malware and risks to your network - devices, also referred to as endpoints.
We've released a set of analytics enhancements to the Duo dashboard to help our customers find information and enable better security analysis; including three new authentication and deployment reports, and an update to our Authentication Log.
Duo's security team explores how the T2 coprocessor is being used by Apple and how it fits into the larger system security model, as well as how this may evolve in the future.
It's finally here: May 2018. The General Data Protection Regulation (GDPR) will begin to be enforced May 25, 2018. Here's how Duo has welcomed the GDPR by creating a Privacy Committee, Privacy Principles, preparing our organization with policies and procedures, and more.