Connect with Duo users and security professionals in our Community.
Can't find what you're looking for? Contact Sales or Contact Support.
← Back to Index
Any device that connects to a network and runs network-based applications, e.g., laptops, desktop computers, servers, and mobile devices.
The Current State of Healthcare Endpoint Security
Duo’s New Features Make Endpoint Security Easy & Effective!
Rising Mobile Malware Attacks Call for Better Endpoint Security
The 2016 Duo Trusted Access Report: Microsoft Edition
The 2016 Duo Trusted Access Report
How to Secure Workstations with Duo Security
How to Secure Mobile Devices with Duo
SC Media 20/20 Panel: Beyond the Endpoint
Prevent risky devices from accessing your enterprise applications with Duo’s Endpoint Remediation, a device access policy that ensures Healthy Devices as part of a complete Trusted Access solution.
With Duo’s Trusted Endpoints, you can secure BYOD and protect access to your applications with device access policies and device certificates.
Device Access Policies
Trusted Devices is part of a complete Trusted Access solution. Duo’s endpoint security software ensures only the most up-to-date devices can access your applications.
Security starts with transparency. Duo gives you complete visibility into both managed and unmanaged devices that authenticate into your applications.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!