Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and and secure access provider. Duo comprises a key pillar of Cisco Secure™s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Bird, Facebook, Lyft, University of Michigan, Yelp, Zillow and more. Founded in Ann Arbor, Michigan, Duo also has offices in Austin, Texas; San Francisco, California; and London. Try it for free at

Our Website:

Latest Content From Duo Security

Whitepaper: The 2020 Duo Security Trusted Access Report

by Duo SecurityJan 07, 2021

Duo Security's annual Trusted Access report focuses on remote access, analyzing findings from 26 million devices, across more than 500,000 applications and over 700 million authentications per month. With more people working from home than ever, organizations across the globe must ask themselves how employees can access all their applications without exposing themselves to risk and ensure that users keep their operating systems and software up to date. The 2020 report addresses these questions and examines what companies can do to secure remote work, and ensure they have a solid remote access strategy.

Whitepaper: Passwordless: The Future of Authentication

by Duo SecurityJan 07, 2021

Passwordless authentication eliminates reliance on passwords and delivers a host of business benefits, including a better user experience, reduced IT time and costs and a stronger security posture. However, even though digital transformation and the business benefits are prompting a shift towards passwordless authentication, most organizations are not yet in a place where this is easily achievable. Duo Security's latest whitepaper covers the challenges and problems that passwords as a form of authentication can cause, plus what true passwordless authentication means and the business benefits. You'll also learn five steps your organization can take to build toward a fully passwordless future.

Whitepaper: From MFA to Zero Trust

by Duo SecurityJan 07, 2021

A zero-trust security model can help you secure against threats such as phishing, stolen credentials and out-of-date devices that may be vulnerable to known exploits and malware. To secure the workforce, you need to verify the identity of the user and ensure the security of their device before granting access to only the applications they need. This guide covers the pillars of Zero Trust and lays out a practical approach in five phases for implementing Zero Trust for the Workforce.

Whitepaper: 10 Things to Consider Before Buying a Mobile Device Management Solution

by Duo SecurityApr 27, 2020

Bring your own device (BYOD) is now part of doing business. Cloud and mobility applications have changed the way we work. Employees want access to corporate applications and data at any time, from anywhere and from whatever device they choose.

This guide examines:
• The rise of BYOD and how it creates new challenges for security practitioners
• Where traditional mobile device management (MDM) solutions fall short and how to secure BYOD without an MDM
• How modern solutions including Unified Endpoint Visibility give insight into which devices (employee- and corporate-owned) are accessing your applications
• 10 key things you should consider before you spend money on an MDM solution

Whitepaper: An Essential Guide to Zero Trust for Microsoft Applications

by Duo SecurityApr 27, 2020

For organizations that leverage Microsoft application suites like Office 365, Windows and Azure, a zero-trust access model can help mitigate the risk of unauthorized access and reduce the risk of data breaches, while ensuring that user productivity isn't impacted. Users can securely access applications from anywhere, at any time and from any device.

In this guide, we share essential tips for administrators to ensure zero-trust access security for three key Microsoft application suites: Office 365, Windows and Azure. It highlights the need for a zero-trust approach to securing Microsoft applications and outlines the benefits, including:

• Establishing user trust
• Gaining visibility into BYOD (bring your own device)
• Establishing device trust
• Enforcing adaptive policies
• Implementing role-based access control

Download this guide to learn why a zero-trust approach to securing your Microsoft applications (and all of your other applications) helps reduce risk without sacrificing simplicity and ease of use.

Whitepaper: Securing the Modern Enterprise

by Duo SecurityApr 27, 2020

As the modern enterprise workforce evolves, so must the security technologies that support them. Traditional security models are far to rigid and painful for end users - Duo has replaced them with flexible, easy-to-use security that focuses on user experience.

Download this for:
• An overview of how Duo helps modern enterprises with their security challenges
• The benefits of Duo's Trusted Access platform to ensure the trust of users and devices for every application
• How Duo offers a scalable, future-proofed solution that can reduce risks for your enterprise organization

Whitepaper: Five Reasons to Protect your VPN with Multi-Factor Authentication

by Duo SecurityApr 27, 2020

Virtual private networks (VPNs) are a tried and true method for providing remote access to internal applications but they aren't a silver bullet. Organizations that provide users with just a username and password to log into their VPN connections could be exposed to data breaches if those credentials are stolen.

Protecting your VPN access with multi-factor authentication (MFA) adds an additional layer of defense. In this guide, we discuss five reasons you should secure your VPN with MFA to ensure trusted access, including:

• To protect against credential theft
• To achieve regulatory compliance
• To gain visibility into all devices
• And more

Whitepaper: Phishing: A Modern Guide to an Age-Old Problem

by Duo SecurityApr 27, 2020

Phishing is now a low-effort, successful method for attackers seeking access to your organization's data. Download this guide to review:

• Examples of phishing, what to look out for, and how modern phishing tactics have evolved
• Tips for both admins and users on how to protect against phishing
• The real-world impact of phishing - who is being targeted, who's clicking on what, and what data is being stolen
• How to establish user and device trust to protect against the impact of phishing

Whitepaper: Two-Factor Evaluation Guide

by Duo SecurityJan 27, 2020

Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).

This guide walks you through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

Download the guide to learn how to evaluate a solution based on:
• Reducing risk and increasing visibility into your environment
• Supporting cloud, mobile and BYOD initiatives
• Total cost of ownership
• Resources required to deploy and provision users

Whitepaper: Five Steps to Perimeter-Less Security: Adopting Zero-Trust to Secure Access

by Duo SecurityJan 27, 2020

Modern security is evolving beyond the perimeter. Users want access to critical work applications from anywhere, at any time and from any device, and the security models to support that must evolve.

Zero-trust embraces the reality that users need frictionless access from any device, and treats every access attempt as if it were originating from an untrusted network.

Download to learn five key steps to explore how to move your organization beyond the perimeter.

• What zero-trust can mean for securing your business
• How to base application access on user identity and device trust
• Five steps to adopt a zero-trust security model within your organization