Cisco Duo Protection and Productivity: Frustrate Attackers, Not Users
Protect your environment while empowering your workforce to operate from anywhere and on any device.
Sometimes strong security can be its own worst enemy. One misspelled password can send a normally trusted user to Help Desk ticket timeout, waiting in queue for their workday to restart. Frustrated employees may seek to avoid the headache by avoiding security and compliance measures, jeopardizing the entire enterprise.
Why make everyone jump over the same hurdles, every time? Cisco Duo's approach to risk-based authentication reduces the burden placed on your trusted users so they can verify their identity quickly and get back to the task at hand.
Deploy Machine Learning (ML) - Powered Risk Assessment
Duo's algorithm assesses risk signals to determine where a login attempt exists on a customizable spectrum of trust. System administrators can rely on Duo to react automatically to risk signals and increase or decrease verification requirements, without manual setup for individual users or applications.
Enforce Location-based Policies Accurately While Preserving Privacy
Most contextual access controls rely on just IP addresses, making the location signal noisy and ineffective when using VPNs. Enter Duo's patent-pending WiFi Fingerprint technology. It creates an anonymized fingerprint of the wi-fi networks available to a user's device to detect a change in location at the time of authentication. This helps to improve accuracy, reduce false-positive while preserving user privacy. If location has changed, Duo can automatically step-up authentication requirements. Other strong security, easy access features include:
Single sign-on
Granular and contextual access policies
TouchID on macOS and Face ID/Touch ID on iOS
Windows Hello, Android Biometrics, and security keys (with biometric verification) when using Duo Passwordless
Detect Known Attack Patterns and Prevent Unauthorized Access
Enable Duo's Risk-Based Factor Selection to automatically step-up to phishing-resistant authentication methods using FIDO2 when known attack patterns are detected. Duo's algorithm considers the history of authentication activity from a single user or for a collection of users across the organization to detect patterns of attack.
Enable Self-Service for Users to Meet Your Organization's Security Requirements
Other access management solutions only offer two outcomes: Block or Allow. A blocked account can bring the workday to a screeching halt for your user and the IT manager who's asked to reinstate access. Duo empowers users to remove their own roadblocks. They can reset their own Active Directory passwords, or if their device is out of compliance, they are given step-by-step instructions to update their system and regain access.