Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and and secure access provider. Duo comprises a key pillar of Cisco Secure™s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Bird, Facebook, Lyft, University of Michigan, Yelp, Zillow and more. Founded in Ann Arbor, Michigan, Duo also has offices in Austin, Texas; San Francisco, California; and London. Try it for free at

Our Website:

Latest Content From Duo Security

Whitepaper: Phishing: A Modern Guide to an Age-Old Problem

by Duo SecurityApr 27, 2020

Phishing is now a low-effort, successful method for attackers seeking access to your organization's data. Download this guide to review:

• Examples of phishing, what to look out for, and how modern phishing tactics have evolved
• Tips for both admins and users on how to protect against phishing
• The real-world impact of phishing - who is being targeted, who's clicking on what, and what data is being stolen
• How to establish user and device trust to protect against the impact of phishing

Whitepaper: Two-Factor Evaluation Guide

by Duo SecurityJan 27, 2020

Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).

This guide walks you through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

Download the guide to learn how to evaluate a solution based on:
• Reducing risk and increasing visibility into your environment
• Supporting cloud, mobile and BYOD initiatives
• Total cost of ownership
• Resources required to deploy and provision users

Whitepaper: Five Steps to Perimeter-Less Security: Adopting Zero-Trust to Secure Access

by Duo SecurityJan 27, 2020

Modern security is evolving beyond the perimeter. Users want access to critical work applications from anywhere, at any time and from any device, and the security models to support that must evolve.

Zero-trust embraces the reality that users need frictionless access from any device, and treats every access attempt as if it were originating from an untrusted network.

Download to learn five key steps to explore how to move your organization beyond the perimeter.

• What zero-trust can mean for securing your business
• How to base application access on user identity and device trust
• Five steps to adopt a zero-trust security model within your organization