Skip navigation

Duo Security is now a part of Cisco

About Cisco

Unified Endpoint Visibility

Security Starts With Transparency

To ensure the security health of your devices, we give you data on who’s accessing what company applications, and under what conditions - without requiring any agents on your users’ devices.

Duo’s Unified Endpoint Visibility gives you actionable data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status.

Easily search, filter and export a list of devices by OS, browser and plugin - refine searches to find out who’s susceptible to the latest iOS or Android vulnerability.

Identify Risky Devices

We also do the work of flagging any out-of-date devices for you, to save administrators time and resources better spent on your core business objectives.

Even a trusted user may be using a mobile device or computer with out-of-date software, leaving them susceptible to vulnerabilities. It only takes one risky device to compromise an entire organization. Knowing this, we will flag risky devices based on your security profile.

Identifying At-Risk Software

Adobe Flash and Oracle Java have over 500 known vulnerabilities - putting your users’ devices and company at risk of a data breach.

Duo gives you insight into which users and devices run outdated Flash or Java versions, and an overview of software use across your organization.

Identify Unmanaged Devices

Secure your BYOD environment by differentiating between company and employee-owned devices that access your applications. It’s easy to deploy the Duo certificate on your company-issued laptops to mark them as ‘Trusted.’

After that, your Unified Endpoint Visibility dashboard will automatically show a breakdown of the trusted (has a Duo certificate) and untrusted (does not have a Duo certificate) endpoints on your network.

Device Access Policies

To prevent the spread of malware and stop risky devices from accessing your applications, create custom access policies and controls based security health profiles. Duo’s Endpoint Remediation allows you to block access based on certain device factors. Closing security gaps starts with keeping devices patched and healthy.

For example, you can block any devices running out-of-date Flash or Java until the user updates their device to the latest software version. That way, you can ensure enterprise applications are protected against all known and reported vulnerabilities.

Trusted Access

Duo's trusted access solution ensures only Trusted Users and Trusted Devices can access protected applications.

This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.

  • “We have seen value in the data we get from Duo regarding authentication sources, as well as now having user device information that was largely opaque to us. Additionally, having the confidence that the plethora of stolen passwords, and the propensity of users to reuse even compromised passwords, will have a reduced impact to our online infrastructure and services.”

    — Thomas Siu, Chief Information Security Officer, Case Western Reserve University
  • “With Duo Security, we are able to provide needed access to critical sites and services without the normal concerns of password theft. The monitoring and alerting has also provided extra insight to potential security issues.”

    — Anonymous, Security Manager, S&P 500 Aerospace & Defense Company

90% of Android Devices Are Out of Date

The 2018 Duo Trusted Access Report: The State of Enterprise Remote Access analyzes user behavior and the security of over 10.7 million devices and nearly half a billion authentications per month.

Get the Free Report

Ready to Get Started?

Try out Duo Access for 30 days to experience trusted access.