Duo’s Unified Endpoint Visibility gives you actionable data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status.
Easily search, filter and export a list of devices by OS, browser and plugin - refine searches to find out who’s susceptible to the latest iOS or Android vulnerability.
We also do the work of flagging any out-of-date devices for you, to save administrators time and resources better spent on your core business objectives.
Even a trusted user may be using a mobile device or computer with out-of-date software, leaving them susceptible to vulnerabilities. It only takes one risky device to compromise an entire organization. Knowing this, we will flag risky devices based on your security profile.
Adobe Flash and Oracle Java have over 500 known vulnerabilities - putting your users’ devices and company at risk of a data breach.
Duo gives you insight into which users and devices run outdated Flash or Java versions, and an overview of software use across your organization.
Secure your BYOD environment by differentiating between company and employee-owned devices that access your applications. It’s easy to deploy the Duo certificate on your company-issued laptops to mark them as ‘Trusted.’
After that, your Unified Endpoint Visibility dashboard will automatically show a breakdown of the trusted (has a Duo certificate) and untrusted (does not have a Duo certificate) endpoints on your network.
To prevent the spread of malware and stop risky devices from accessing your applications, create custom access policies and controls based security health profiles. Duo’s Endpoint Remediation allows you to block access based on certain device factors. Closing security gaps starts with keeping devices patched and healthy.
For example, you can block any devices running out-of-date Flash or Java until the user updates their device to the latest software version. That way, you can ensure enterprise applications are protected against all known and reported vulnerabilities.
This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.
“We have seen value in the data we get from Duo regarding authentication sources, as well as now having user device information that was largely opaque to us. Additionally, having the confidence that the plethora of stolen passwords, and the propensity of users to reuse even compromised passwords, will have a reduced impact to our online infrastructure and services.”
“With Duo Security, we are able to provide needed access to critical sites and services without the normal concerns of password theft. The monitoring and alerting has also provided extra insight to potential security issues.”