Search for blog posts, documentation, or pages

Lately we’ve been asking for feedback from our customers. Here are some of the things they’ve been saying they like about us.

1. Authentication for everyone Some companies focus on hardware tokens, forcing users to carry extra devices around with them. Others only provide phone-based solutions that rely on cell service, making it impossible to log in from hospitals, dead zones, and when travelling internationally.

We know that you have a wide range of users, all with different devices and needs. That’s why we support authentication from all types of phones — both with and without cell service — and also sell and support hardware tokens.

2. Integrates with everything Use the same system to protect remote access VPN logins, internal web applications, and remote access to servers.

Duo only charges per user, not per integration, so there’s no reason not to secure logins across your organization.

3. Rapid deployment Deploying Duo Security is fast and easy because there’s no hardware to install or tokens to distribute. It takes a few minutes to set up Duo with your VPN (upload the package and change some configuration settings), servers (./install Duo Unix), or web application (use the two-function API). Then let your users enroll themselves — no collecting phone numbers, manually importing users, or managing hardware inventory.

It’s also easy to deploy two-factor authentication for a subset of users, so you can test on a small scale before launching to the entire organization.

4. Inline authentication Duo cares about user experience. Putting extra steps into the login process is never pretty, so Duo reduces the friction by adding the second prompt inline. This creates a fully-branded, consistent experience for your users. Duo goes the extra mile by providing live-updating feedback during the login process:

Duo doesn’t surprise or confuse your users, and our customers love us for that.

5. Duo Push Everyone loves Duo Push!

Seeing login details and authenticating with one tap is the fastest and most frictionless way to log in, and is supported on iPhone and Android phones for all accounts. Duo Push is also our most secure authentication method — the use of asymmetric key cryptography means that login requests are unspoofable even in the event of an RSA-style breach.

Ready to try Duo? Sign up for a free 30-day trial

Categories

Free Guide

Two-Factor Authentication Evaluation Guide

This guide walks through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

Tags

phishing (20)  security news (17)  healthcare security (16)  two-factor-authentication (15)  passwords (15)  weekly ink (13)  federal cybersecurity (10)  infosec-evolution (9)  malware (9)  cloud security (9)  banking security (8)  retail data breaches (8)  rsac2015 (8)  data breaches (7)  stolen-passwords (7)  duo mobile (7)  financial data breach (7)  2fa (6)  financial institutions (6)  pci dss (6)  stolen credentials (6)  ooba (6)  encryption (5)  atms (5)  transaction-level 2fa (5)  remote access security (5)  webinar (5)  healthit (5)  healthcare cybersecurity (5)  mobile security (5)  defcon-23 (4)  retail (4)  bank security (4)  security threats (4)  2-factor-authentication (4)  platform edition (4)  remote access attacks (4)  data breach notification (4)  hipaa (4)  financial data security (4)  retail data security (4)  third-party security (4)  rig exploit kit (4)  blackhat 2015 (4)  vulnerability (4)  medical identity theft (4)  google (4)  pos malware (4)  duo-security-summit (3)  home depot (3)  security research (3)  healthcare data breach (3)  defcon (3)  e-prescriptions (3)  anthem (3)  end-user authentication (3)  payment card breach (3)  media security (3)  critical infrastructure security (3)  manufacturing security (3)  otp bypass (3)  law firm security (3)  twitter (3)  retail data risks (3)  car security (3)  ffiec (3)  ssl (3)  retail ebook (3)  hipaa security rule (3)  defense in depth (3)  ehr (3)  iot security (3)  uk security (3)  health it (3)  target (3)  higher education (3)  two-factor (3)  strong-authentication (3)  social engineering (3)  dyre trojan (3) 

Duo is hiring!

View our open positions

Subscribe to our Newsletter

Get product updates, interesting content, and invitations to online and live events.