Skip navigation

Strong Endpoint Security

Ensure only the most up-to-date and healthy devices can access your applications. Trusted Devices is part of a complete Trusted Access solution.

Security Starts With Transparency

It’s not always easy to gain visibility into both corporate-owned and personal user devices on your network.

That’s why we’ve made it easy to see what devices are being used to access your enterprise applications with extensive user and device reports, available through Duo’s Admin Panel.

Duo’s Device Insight collects and analyzes data about your devices, including software versions, enabled security features and jailbroken or rooted status so you can identify any risky devices before they become a problem.

Protect Against Known Vulnerabilities

With this data, you can create custom access policies based on different parameters to fit your security needs. For example, with Duo's privileged user control, you can block any devices running an older version of Flash or Internet Explorer from accessing your applications.

You can protect against vulnerabilities that exploit known software flaws on your users’ risky devices to install malware or get access to company applications by automatically blocking them with Duo’s Endpoint Remediation.

Block Untrusted Endpoints

Secure critical applications and data by restricting access only to corporate devices. Duo has the ability to detect if a device is unmanaged and is attempting to access a sensitive application. Duo can then enforce access controls and will explain to an end user why they’re being blocked.

Close Security Gaps

Gain faster time to security by notifying and enabling your users to update their own out-of-date devices at login with Duo’s Self-Remediation, saving administrator time and resources.

By prompting your users to update, you can close security gaps faster and protect against known vulnerabilities.

Fast, Secure Access

With Duo’s Trusted Devices and Networks, you can give your users faster access without compromising security. Similar to a “Remember my computer” option, you can designate users’ devices and networks as trusted to allow your users to log in without completing the two-factor process each time.

By flagging trusted networks with listed IP addresses or CIDR blocks, you can develop strong authentication policies for web-based access to company services.

Trusted Access

Duo's Trusted Access ensures only Trusted Users and Trusted Devices can access protected applications.

This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.

  • As a result of the extensive search for a comprehensive solution, Duo has emerged as a product that offers comprehensive solution, seamless integration and excellent customer support. The implementation of Duo Platform was quick, efficient, and in accordance with our customers’ requirements

    — Natalia Kory, Chief Technology Officer, Clarient
  • “One thing that comes to mind when I think of Duo is ‘peace of mind.’ I know that only authorized personnel are accessing our servers and services, which is priceless.”

    — Ramesh Sivaraman, Senior System Administrator, G4S

Biometrics Booming! Flash Fizzling! Phishing Floundering!

The 2019 Duo Trusted Access Report: Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce

This year, more customers are using biometrics as an authentication factor to access applications with 77 percent of Duo customers having devices with biometrics enabled. Meanwhile, 71 percent of Duo customers have Flash uninstalled from their devices. And fewer Duo customers are falling for internal phishing simulations – 47 percent of phishing campaigns captured at least one set of credentials and 39 percent involved at least one out-of-date devices, which is an improvement over last year.

Check out all that data and much more in The 2019 Duo Trusted Access Report: Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce.

Download ebook