Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and and secure access provider. Duo comprises a key pillar of Cisco Secure™s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Bird, Facebook, Lyft, University of Michigan, Yelp, Zillow and more. Founded in Ann Arbor, Michigan, Duo also has offices in Austin, Texas; San Francisco, California; and London. Try it for free at Duo.com

Our Website: https://www.duo.com


Latest Content From Duo Security

Whitepaper: Five Steps to Perimeter-Less Security: Adopting a Zero-Trust Model

by Duo SecurityApr 16, 2021

Modern security is evolving beyond the perimeter. Users want to access critical work applications from anywhere, at any time and from any device, and the security models to support that must evolve. This eBook dives into the zero-trust security model and outlines five crucial steps you can take to efficiently adopt the zero-trust model within your organization.


Whitepaper: Anatomy of a Modern Phishing Attack

by Duo SecurityFeb 26, 2021

Phishing attacks can lead to credential theft, unauthorized access to sensitive systems, and data breaches of confidential information. This guide covers the anatomy of a phishing attack using a real-life case study of a popular company that was breached. In this guide you'll learn how it could have been prevented and what you can do to protect yourself against phishing threats.


Whitepaper: The Trouble with Phishing

by Duo SecurityJan 20, 2021

Phishing is one of the most common threats hitting organizations, because it often targets our most vulnerable interests. It leads to credential theft, unauthorized access to sensitive systems, and data breaches of confidential information. This guide by Duo Security details the problems around phishing, how it works, and what you can do about it.


Whitepaper: The Essential Guide to Securing Remote Access

by Duo SecurityJan 20, 2021

The recent massive shift to remove work can introduce new security threats and challenges to organizations. Stolen passwords, phishing scams and exploited known vulnerabilities targeting your users, their out-of-date devices, cloud applications and software can all be cause for unwanted hacks. This guide covers different remote security threats and security best practice recommendations to help your organization protect against a data breach.


Whitepaper: Five Reasons to Protect your VPN with Multi-Factor Authentication

by Duo SecurityJan 20, 2021

Virtual private networks (VPNs) are a tried and true method for providing remote access to internal applications. However, they aren't the end-all-be-all for secure access for off-site users to connect to your organization's applications. Multi-factor authentication (MFA) can provide an additional layer of protection, and Duo Security's guide outlines five reasons why securing your VPN with MFA to ensure trusted access is a good idea.


Whitepaper: Zero Trust Evaluation Guide

by Duo SecurityJan 20, 2021

Can you verify your users are who they say they are? Do you have detailed insight into every type of device accessing your applications, across every platform? It can be overwhelming to know where to start on your zero trust journey and what questions to ask. This guide explores these questions and can help you evaluate different solutions, along with what requirements your zero-trust platform should have to support a modern organization.


Whitepaper: The 2020 Duo Security Trusted Access Report

by Duo SecurityJan 07, 2021

Duo Security's annual Trusted Access report focuses on remote access, analyzing findings from 26 million devices, across more than 500,000 applications and over 700 million authentications per month. With more people working from home than ever, organizations across the globe must ask themselves how employees can access all their applications without exposing themselves to risk and ensure that users keep their operating systems and software up to date. The 2020 report addresses these questions and examines what companies can do to secure remote work, and ensure they have a solid remote access strategy.


Whitepaper: Passwordless: The Future of Authentication

by Duo SecurityJan 07, 2021

Passwordless authentication eliminates reliance on passwords and delivers a host of business benefits, including a better user experience, reduced IT time and costs and a stronger security posture. Is going truly passwordless possible though? Challenges include complex and hybrid IT environments, administrative costs and still needing to meet compliance regulations. Our guide lays out a five-step path your organization can follow to build toward a truly passwordless future.


Whitepaper: From MFA to Zero Trust

by Duo SecurityJan 07, 2021

A zero-trust security model can help you secure against threats such as phishing, stolen credentials and out-of-date devices that may be vulnerable to known exploits and malware. To secure the workforce, you need to verify the identity of the user and ensure the security of their device before granting access to only the applications they need. This guide covers the pillars of Zero Trust and lays out a practical approach in five phases for implementing Zero Trust for the Workforce.


Whitepaper: 10 Things to Consider Before Buying a Mobile Device Management Solution

by Duo SecurityApr 27, 2020

Bring your own device (BYOD) is now part of doing business. Cloud and mobility applications have changed the way we work. Employees want access to corporate applications and data at any time, from anywhere and from whatever device they choose.

This guide examines:
• The rise of BYOD and how it creates new challenges for security practitioners
• Where traditional mobile device management (MDM) solutions fall short and how to secure BYOD without an MDM
• How modern solutions including Unified Endpoint Visibility give insight into which devices (employee- and corporate-owned) are accessing your applications
• 10 key things you should consider before you spend money on an MDM solution