Duo’s Trusted Access
Secure access to your applications and data, no matter where your users are – on any device – from anywhere. For organizations of all sizes, Duo’s trusted access solution creates trust in users, devices and the applications they access. Reduce the risk of a data breach and ensure trusted access to sensitive data.
Verify the identity of all users with strong two-factor authentication – before granting access to corporate applications to protect against phishing and other access threats.
Easy For Every User
Duo’s wide variety of authentication methods make it easy for every user to securely and quickly log in. Duo Push, sent by our Duo Mobileauthentication app, allows users to approve push notifications to verify their identity. We also support Universal 2nd Factor (U2F) security tokens, hardware tokens, mobile passcodes, SMS, phone callback and biomtrics like Touch ID to provide flexible and accessible options for all types of users – from clinicians to third-party contractors.
Easily Enroll and Provision Users
While Duo’s user self-enrollment method is intuitive enough for users to do on their own, we also offer automatic enrollment options for ease of user provisioning for larger organizations. Improve speed to security by quickly synchronizing thousands of users from existing directories like Active Directory and Azure AD, or import users via API. Plus, users can manage their own authentication devices through our self-service portal, reducing your help desk support time.
Reduce Help Desk Costs
Self-Service Management provides end users with the ability to easily manage their own devices during login without having to go to a separate portal or contact help desk when they get a new mobile phone.
Verify End User Identities
Duo Help Desk Push enables admins and help desk staff to verify end user identities with Duo Push. Before making changes at the request of an end user, Duo Help Desk Push helps you validate that the user is who they say they are.
Quickly Deploy, at Scale
Deploying at scale has never been so painless. Duo’s lightweight software as a service (SaaS) solution requires minimal infrastructure to roll out to thousands of users. Plus, we send updates to your users’ devices to ensure they always have the latest security patches and features, eliminating overhead on your end.
Assess User Risk With Phishing Simulation
Launch targeted phishing simulations within your organization with Duo’s Phishing Simulator to identify vulnerable users and devices. Our data dashboards allow you to measure and monitor your company’s risk of getting phished from one main control center.
When paired with strong identity verification, Duo allows you to check that your users’ devices meet your security standards before granting them access; safeguarding against vulnerable or potentially compromised endpoints.
Assess Overall Device Security Hygiene
With Duo’s Unified Endpoint Visibility, you can see, track and report on all end user devices from a single dashboard. Duo’s user and device reports give admins actionable data on user behavior and risky devices, while deployment and authentication reports let you track admin progress. Our detailed user, admin and telephony logs let you search or easily integrate with SIEM systems.
Monitor and Identify Risky Devices
With Duo’s actionable data on platforms, systems and security status, you can easily refine searches to find vulnerable endpoints. Notify, warn and/or block users from accessing your applications until they update their devices with Duo’s Self-Remediation and Endpoint Remediation. Duo also flags devices as tampered, indicating devices that have been rooted, jailbroken or have failed SafetyNet checks.
Identify Corporate vs. Personal Devices
Get a breakdown of corporate-managed and personal devices accessing your applications, and enforce policies based on device type. Duo’s Trusted Endpoints lets you issue device certificates that are checked at login for greater insight into and control over your BYOD environment, while limiting access by any personal devices that don’t meet your security requirements.
Secure Mobile Device Access Without an MDM
Secure employees’ personal, non-corporate managed devices without mobile device management (MDM). With Duo Mobile for Trusted Endpoints you can block devices from accessing your applications based on OS, browser and plugin versions and how long they’ve been out of date; status of enabled security features (configured or disabled); full disk encryption; mobile device biometrics (Face ID/Touch ID); screen lock or tampered (jailbroken, rooted or failed Google’s SafetyNet).
Set policies to grant or block access attempts by identity or device and based on contextual factors such as user location, network address ranges, biometrics, device security and more.
Enforce Role-Based Access Policies
Determine who can access which applications based on an individual or group, or their specific roles and responsibilities, with Duo’s trusted access solution. Set customized policies based on authentication method on a per-user or per-group basis.
Restrict Access Based on Geolocation
See where users are authenticating from and prevent unauthorized access from any geographic location. Block access from the Russian Federation, North Korea or any other country, for that matter, to thwart access attempts from from any geolocation.
Access by Network
Control Access Based on Network
Enforce controls based on the network from which a user is trying to access applications. Duo allows you to grant or deny access based on a set of IP address ranges that you determine.
Block Tor and Anonymous Networks
Block authentication attempts from anonymous networks like Tor. Duo’s trusted access aggregates data about users’ authentication devices and gives you insight into what kind of network they’re authenticating from.
Set Fine-Grained Device Access Policies
Control which devices can access applications based on hygiene, operating system, browser and plugins; and whether screenlocks and biometrics are enabled, the device is corporate- or employee-owned, or if the devices has been tampered, jailbroken or rooted.
Secure Devices Without an MDM
Identify all devices that access your environment, tag them to specific users and understand who owns a device, how many they’re using and what applications they access. Get a comprehensive view and insights of all end-user devices without an MDM.
Ensure Healthy, Updated Devices
Notify your users to update their own devices at login with Duo’s Self-Remediation. Or, use Duo’s Endpoint Remediation to automatically block device access to enterprise applications based on outdated software versions.
Seamless and secure access to cloud and on-premises applications and servers from anywhere, on any device, without a VPN.
Secure Access to Internal Web Applications
Protect access to your internal web applications and resources using Duo’s two-factor authentication (2FA). Access controls allow you to make application access decisions based on the trust established in user identities and the trustworthiness of their devices, instead of the networks from where access originates.
Integrate With Remote Access Providers
Duo’s solution integrates seamlessly with major enterprise remote access gateway and VPN providers, including CA SiteMinder, Oracle Access Manager, Juniper, Cisco, Palo Alto Networks, F5, Citrix and more.
Flexible, Risk-Based Adaptive Security Policies to Strengthen Control
Define policies based on your organization’s risk tolerance levels to limit access to internal applications and servers. Make intelligent real time decisions before granting privileged access to remote users by defining which users on which devices can access what applications and servers under which circumstances – that’s the main idea behind a zero-trust security model.
Access to Specific Resources Without a VPN
Grant users secure access to all protected applications from anywhere, without a VPN. Control privileged access to specific internal applications and data centers instead of implementing full VPN access, which comes with the risk of breaches and privilege abuse.
Secure Remote Access to SSH
Securely access SSH without a VPN. With Duo, you can remotely SSH to configured hosts after installing Duo’s connectivity tool.
LOGON is a pan-asian company operating in China, Hong Kong (HK), India, Singapore, Malaysia, Indonesia, Vietnam, Philippines and Thailand. LOGON has local dedicated trained product specialists in Hong Kong, Guangzhou, Kuala Lumpur, Mumbai and Bangalore. LOGON acts both as value added reseller and sole distributor for award winning software solutions. Customers can buy new licenses, purchase upgrades and renewals from any of our local offices. Contact us for first line support during evaluations, PoCs. We offer best practices consulting services and classroom & online training. Check our site for latest offers, special discounts, bundle deals, etc..