Duo Tech Talk: Join us tonight at 6:30-8:30pm EST to hear Charlie Miller present on The Best of Bug Finding

Since starting Duo, the question we’ve gotten most often is: Why another two-factor auth company?

Because nothing else stops attackers in their tracks like strong authentication — if it can be made easy. When the Gartner analyst team asked “If an organization were to spend $100 a year more per employee where should it spend it to get the greatest improvement in security?”, they had no problem arriving at the answer: “strong authentication.” But the spread of two-factor authentication has been hindered by the cost, complexity, and poor user experience of such products over the last 20 years. At Duo, we’re bringing decades of commercial and research experience in enterprise, service provider, mobile, and consumer Internet security to solve the challenges in adopting two-factor authentication. We believe

  • Mobile adoption changes everything. A usable second factor of “something you have” is now available to anyone with a mobile phone – and today’s smartphones are more capable and better networked than laptops were just 5 years ago!
  • Modern attacks require a dynamic defense. Attackers are innovating faster than overworked admins and static products can address; cloud-delivered security services, deployable at scale, backed by specialized teams are the best way to keep up.
  • Usability matters. We aim to frustrate attackers, not users and admins, with solutions that are easy to deploy, manage, and operate.

When your anti-virus, firewall, IPS, host security, and other controls have been bypassed by attackers who have taken over your users’ accounts, strong two-factor authentication is your best defense.

Because sometimes it takes a belt AND suspenders to keep from getting de-pantsed!


Free Guide

Two-Factor Authentication Evaluation Guide

This guide walks through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.


phishing (16)  two-factor-authentication (15)  passwords (13)  healthcare security (11)  malware (7)  ooba (6)  atms (5)  2fa (5)  cloud security (5)  encryption (5)  webinar (5)  financial institutions (5)  financial data breach (5)  transaction-level 2fa (5)  stolen-passwords (5)  healthit (4)  federal cybersecurity (4)  data breaches (4)  hipaa (4)  data breach notification (4)  pci dss (4)  retail (4)  security news (4)  home depot (3)  otp bypass (3)  hipaa security rule (3)  banking security (3)  strong-authentication (3)  two-factor (3)  twitter (3)  e-prescriptions (3)  bank security (3)  healthcare cybersecurity (3)  rig exploit kit (3)  medical devices (3)  defense in depth (3)  retail ebook (3)  stolen credentials (3)  retail data breaches (3)  target (3)  vulnerability (3)  anthem (3)  third-party security (3)  iot security (3)  health it (3) 

Duo is hiring!

View our open positions

Follow Us

Subscribe to our Newsletter

Get product updates, interesting content, and invitations to online and live events.