Multi-Factor (MFA) | Two-Factor (2FA) Authentication

-MFA/2FA authentication is the simplest, most effective way to make sure users are who they say they are.

Security Impact Delivered

 
Duo Security’s two-factor solution combines intuitive usability with advanced security features to protect against the latest attack methods and to provide a frictionless authentication experience. Raised Image

Secure Everything, Everywhere

TRUSTED USERS
Duo’s authentication is built on the foundation of zero trust. Duo verifies the identity of users and protects against breaches due to phishing and other password attacks with an advanced two-factor authentication solution, verifying trust in multiple ways before granting access. Duo’s contextual user access policies let you create custom controls to further protect access to your applications based on type of users, devices and apps.

Learn more about Trusted Users

TRUSTED DEVICES When organizations deploy Duo, device trust becomes a part of the authentication workflow during the user login process for protected applications. This enables Duo to provide in-depth visibility across managed and unmanaged devices, however and from wherever the users connect to these applications. Duo also verifies the security health and management status of endpoints before granting access to your applications, and blocks access if the device is unhealthy or does not meet your security requirements.

You can easily ensure that users maintain appropriate device hygiene, whether by updating the OS patch levels or browser versions, checking for presence of device certificates, or enabling security features such as enterprise antivirus (AV) agents and disk encryption.

Learn more about Trusted Devices
SECURE EVERY APPLICATION
To secure every type of application, Duo’s solution easily and quickly integrates with virtual private networks (VPNs) and remote access gateways like CA SiteMinder, Juniper, Cisco, Palo Alto Networks, Citrix and more; enterprise cloud apps like Microsoft O365, Salesforce, Google Apps, AWS and Box; and on-premises and web apps like Epic, Splunk, Confluence, Shibboleth and more. Duo provides APIs and client libraries for everything else, including your custom and proprietary software.

Learn more about Every Application


Raised Image

Duo verifies the identity of your users with two-factor authentication, and the security health of their devices before they connect to your applications.

START YOUR PASSWORD LESS JOURNEY
Going passwordless means establishing a strong assurance of a user’s identity without relying on passwords, allowing them to authenticate using biometrics, security keys or a mobile device. Duo will help you get to a passwordless future starting with reducing the number of logins. With Duo’s secure cloud-based single sign-on (SSO), you can leverage your existing identity provider for faster provisioning and improved accuracy whether in the cloud or on-premises, allowing your users to log in just once to securely access your organization’s applications.

Duo’s passwordless authentication solution will improve user experience, reduce IT overhead, and strengthen security posture. Duo uniquely takes its passwordless solution a step further by enabling organizations to implement a passwordless authentication that’s secure and usable. Duo ensures that a risky device (unknown, jailbroken or out of date) cannot be used to authenticate without a password. In addition, Duo continually monitors logins and new enrollments to automatically detect anomalies, alerting your IT administrators to potential risks.

Learn more about Passwordless
ADAPTIVE POLICIES & CONTROLS
Security policies for every situation. Duo’s granular advanced policy controls provide zero trust protection to environments with sensitive data, whether on-premises or in the cloud. With Duo, you can create custom access policies based on role, device, location and many other contextual factors that are the bedrock of a strong zero trust security framework.

Duo verifies the identity of your users with two-factor authentication and the security health of their devices before they connect to your applications. With Duo, IT administrators may also create complex policy rules that continuously monitor logins to identify and flag unusual activity.


"We are a very open organization and want employees to work from anywhere. Box manages highly sensitive data for some of the largest organizations in the world. As a result of this, we need to ensure the highest level of protection for all user interactions with our services. We also need to meet an extremely high bar for security standards while making it easy for users to be productive.

Duo helps us do just that.”

Mark Schooley
Senior Director, IT Operations & Engineering

Raised Image




VISIBILITY & ANALYTICS
Duo’s dashboard, reports and logs make it easy to monitor every user, on any device, anywhere, so you can identify security risks before they lead to compromised information. Get visibility into authentication attempts, including data on IP addresses, anonymous networks, blacklisted countries and more from Duo’s admin panel.

Duo gives you complete visibility and helps you inventory every endpoint accessing your applications and provides data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status. You can easily search, filter and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest iOS or Android vulnerability.

Duo Trust Monitor analyzes real-time authentication data to create a baseline of normal user behavior at the point of login. Once Duo Trust Monitor observes these access patterns, it surfaces risky logins to help the security team identify suspicious activity and aid in the investigation of compromised accounts.

AVAILABILITY
Duo’s Service Level Agreements (SLA) guarantees a 99.99% uptime and is distributed across multiple geographical locations for a seamless failover. Duo is maintained independently from your systems, keeping you safe even in the event of a breach.
FLEXIBILITY
As a cloud-based solution, it’s easy to provision new users and protect new applications with Duo as your company grows, because there are no limits or additional charges per application. We believe that if you’re protecting a user’s access to your most important applications, you shouldn’t be penalized or charged more to protect them everywhere. Easily onboard new users with Duo’s self-enrollment, bulk enrollment or Active Directory synchronization options.

There are a variety of ways Duo’s 2FA can work. You can use a smartphone, landline (such as your office or home phone), tablet or hardware token. Authentication methods include mobile push, biometrics, time-based one-time passcodes, bypass codes, security tokens, SMS passcodes and callback.

Learn more about User Provisioning



Raised Image
Duo gives you insight into the security posture of both corporate and personal devices used to connect to company applications and services.



Digital Assurance Advisors, your personal authority in cyber security, will assist in securing your Authentication Validation needs and more. Contact us for more information or to begin your complementary 30-day Proof of Value! +1.414.236.4200