Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Duo Security

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and Zero Trust for the Workplace provider. Duo enables organizations to provide secure access to all of their critical applications - for any user, from anywhere, and with any device.

Our Website:

Latest Content From Duo Security

Whitepaper: 10 Things to Consider Before Buying a Mobile Device Management Solution

by Duo SecurityApr 27, 2020

Bring your own device (BYOD) is now part of doing business. Cloud and mobility applications have changed the way we work. Employees want access to corporate applications and data at any time, from anywhere and from whatever device they choose.

This guide examines:
• The rise of BYOD and how it creates new challenges for security practitioners
• Where traditional mobile device management (MDM) solutions fall short and how to secure BYOD without an MDM
• How modern solutions including Unified Endpoint Visibility give insight into which devices (employee- and corporate-owned) are accessing your applications
• 10 key things you should consider before you spend money on an MDM solution

Whitepaper: An Essential Guide to Zero Trust for Microsoft Applications

by Duo SecurityApr 27, 2020

For organizations that leverage Microsoft application suites like Office 365, Windows and Azure, a zero-trust access model can help mitigate the risk of unauthorized access and reduce the risk of data breaches, while ensuring that user productivity isn't impacted. Users can securely access applications from anywhere, at any time and from any device.

In this guide, we share essential tips for administrators to ensure zero-trust access security for three key Microsoft application suites: Office 365, Windows and Azure. It highlights the need for a zero-trust approach to securing Microsoft applications and outlines the benefits, including:

• Establishing user trust
• Gaining visibility into BYOD (bring your own device)
• Establishing device trust
• Enforcing adaptive policies
• Implementing role-based access control

Download this guide to learn why a zero-trust approach to securing your Microsoft applications (and all of your other applications) helps reduce risk without sacrificing simplicity and ease of use.

Whitepaper: Securing the Modern Enterprise

by Duo SecurityApr 27, 2020

As the modern enterprise workforce evolves, so must the security technologies that support them. Traditional security models are far to rigid and painful for end users - Duo has replaced them with flexible, easy-to-use security that focuses on user experience.

Download this for:
• An overview of how Duo helps modern enterprises with their security challenges
• The benefits of Duo's Trusted Access platform to ensure the trust of users and devices for every application
• How Duo offers a scalable, future-proofed solution that can reduce risks for your enterprise organization

Whitepaper: Five Reasons to Protect your VPN with Multi-Factor Authentication

by Duo SecurityApr 27, 2020

Virtual private networks (VPNs) are a tried and true method for providing remote access to internal applications but they aren't a silver bullet. Organizations that provide users with just a username and password to log into their VPN connections could be exposed to data breaches if those credentials are stolen.

Protecting your VPN access with multi-factor authentication (MFA) adds an additional layer of defense. In this guide, we discuss five reasons you should secure your VPN with MFA to ensure trusted access, including:

• To protect against credential theft
• To achieve regulatory compliance
• To gain visibility into all devices
• And more

Whitepaper: Phishing: A Modern Guide to an Age-Old Problem

by Duo SecurityApr 27, 2020

Phishing is now a low-effort, successful method for attackers seeking access to your organization's data. Download this guide to review:

• Examples of phishing, what to look out for, and how modern phishing tactics have evolved
• Tips for both admins and users on how to protect against phishing
• The real-world impact of phishing - who is being targeted, who's clicking on what, and what data is being stolen
• How to establish user and device trust to protect against the impact of phishing

Whitepaper: Two-Factor Evaluation Guide

by Duo SecurityJan 27, 2020

Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).

This guide walks you through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

Download the guide to learn how to evaluate a solution based on:
• Reducing risk and increasing visibility into your environment
• Supporting cloud, mobile and BYOD initiatives
• Total cost of ownership
• Resources required to deploy and provision users

Whitepaper: Five Steps to Perimeter-Less Security: Adopting Zero-Trust to Secure Access

by Duo SecurityJan 27, 2020

Modern security is evolving beyond the perimeter. Users want access to critical work applications from anywhere, at any time and from any device, and the security models to support that must evolve.

Zero-trust embraces the reality that users need frictionless access from any device, and treats every access attempt as if it were originating from an untrusted network.

Download to learn five key steps to explore how to move your organization beyond the perimeter.

• What zero-trust can mean for securing your business
• How to base application access on user identity and device trust
• Five steps to adopt a zero-trust security model within your organization

Whitepaper: The Trouble with Phishing

by Duo SecurityJan 27, 2020

Phishing is one of the most common threats hitting organizations. It leads to credential theft, unauthorized access to sensitive systems, and data breaches of confidential information.

It's the easiest attack for malicious hackers to successfully launch, but it's also easy to protect against.

This guide details the problems around phishing, how it works, and solutions to prevent account takeover.

• The latest phishing statistics by industry
• A breakdown of how phishing works
• The anatomy of a phishing attack

Whitepaper: The Essential Guide to Securing Remote Access

by Duo SecurityJan 27, 2020

Work anywhere, anytime - this adage has employees connecting to corporate networks via web and cloud apps, as well as remote access services like VPN and RDP to do their job.

But with this convenience comes a number of threats to users and devices - like phishing, password-stealing malware and known vulnerabilities affecting out-of-date software. VPN, RDP, third-party vendor, and cloud and web app access are also targets of malicious hackers.

Download this guide to explore the different threats and learn security best practices to help protect your organization.

• Specific types of remote access threat targeting users, devices and remote access services like RDP and VPNs
• Security concerns with third-party providers and cloud access
• Ways to mitigate risks and avoid a data break