Search for blog posts, documentation, or pages

Lately we’ve been asking for feedback from our customers. Here are some of the things they’ve been saying they like about us.

1. Authentication for everyone Some companies focus on hardware tokens, forcing users to carry extra devices around with them. Others only provide phone-based solutions that rely on cell service, making it impossible to log in from hospitals, dead zones, and when travelling internationally.

We know that you have a wide range of users, all with different devices and needs. That’s why we support authentication from all types of phones — both with and without cell service — and also sell and support hardware tokens.

2. Integrates with everything Use the same system to protect remote access VPN logins, internal web applications, and remote access to servers.

Duo only charges per user, not per integration, so there’s no reason not to secure logins across your organization.

3. Rapid deployment Deploying Duo Security is fast and easy because there’s no hardware to install or tokens to distribute. It takes a few minutes to set up Duo with your VPN (upload the package and change some configuration settings), servers (./install Duo Unix), or web application (use the two-function API). Then let your users enroll themselves — no collecting phone numbers, manually importing users, or managing hardware inventory.

It’s also easy to deploy two-factor authentication for a subset of users, so you can test on a small scale before launching to the entire organization.

4. Inline authentication Duo cares about user experience. Putting extra steps into the login process is never pretty, so Duo reduces the friction by adding the second prompt inline. This creates a fully-branded, consistent experience for your users. Duo goes the extra mile by providing live-updating feedback during the login process:

Duo doesn’t surprise or confuse your users, and our customers love us for that.

5. Duo Push Everyone loves Duo Push!

Seeing login details and authenticating with one tap is the fastest and most frictionless way to log in, and is supported on iPhone and Android phones for all accounts. Duo Push is also our most secure authentication method — the use of asymmetric key cryptography means that login requests are unspoofable even in the event of an RSA-style breach.

Ready to try Duo? Sign up for a free 30-day trial


Free Guide

Ebook: A Modern Guide to Retail Data Risks

Avoiding Catastrophic Data Breaches in the Retail Industry


phishing (20)  two-factor-authentication (18)  security news (17)  healthcare security (17)  passwords (15)  weekly ink (13)  cloud security (12)  mobile security (11)  federal cybersecurity (10)  malware (10)  infosec-evolution (9)  duo mobile (8)  rsac2015 (8)  retail data breaches (8)  banking security (8)  data breaches (7)  stolen credentials (7)  financial data breach (7)  stolen-passwords (7)  pci dss (6)  ios security (6)  remote access attacks (6)  2fa (6)  encryption (6)  ooba (6)  financial institutions (6)  remote access security (6)  healthit (5)  healthcare cybersecurity (5)  uk security (5)  platform edition (5)  higher education (5)  media security (5)  webinar (5)  atms (5)  transaction-level 2fa (5)  pos malware (5)  retail (4)  2-factor-authentication (4)  security research (4)  third-party security (4)  vulnerability (4)  data breach notification (4)  security threats (4)  financial data security (4)  rig exploit kit (4)  endpoint security (4)  medical identity theft (4)  google (4)  retail data security (4)  healthcare data breach (4)  ios (4)  bank security (4)  defcon-23 (4)  hipaa (4)  blackhat 2015 (4)  law firm security (3)  health it (3)  cisco vpn (3)  duo-security-summit (3)  car security (3)  payment card breach (3)  ffiec (3)  ssl (3)  retail data risks (3)  stock market (3)  aws security (3)  retail ebook (3)  hipaa security rule (3)  windows security (3)  strong-authentication (3)  two-factor (3)  manufacturing security (3)  critical infrastructure security (3)  out of band authentication (3)  flash vulnerabilities (3)  ios vulnerabilities (3)  flash security (3)  otp bypass (3)  dyre trojan (3)  social engineering (3)  byod (3)  twitter (3)  home depot (3)  defense in depth (3)  e-prescriptions (3)  defcon (3)  end-user authentication (3)  target (3)  anthem (3)  ehr (3)  iot security (3)  outlook-web-app (3) 

Duo is hiring!

View our open positions

Subscribe to our Newsletter

Get product updates, interesting content, and invitations to online and live events.