Software

Duo MFA, Duo Beyond and Duo Access

by Cisco Systems GmbH

Logo of Cisco Systems

Key Facts

  • Überprüfen Sie die Identität in Sekunden.
  • Schützen Sie jede Anwendung auf jedem Gerät.
  • Beschränken Sie den Remotezugriff auf bestimmte Anwendungen, ohne das Netzwerk freizulegen.

Categories

  • Application security
  • Authentication
  • Mobile device management
  • Mobile security
  • VPN / remote access
  • Access protection

Key Facts

  • Überprüfen Sie die Identität in Sekunden.
  • Schützen Sie jede Anwendung auf jedem Gerät.
  • Beschränken Sie den Remotezugriff auf bestimmte Anwendungen, ohne das Netzwerk freizulegen.

Categories

  • Application security
  • Authentication
  • Mobile device management
  • Mobile security
  • VPN / remote access
  • Access protection
Show More

PRODUCT DESCRIPTION

Duo MFA

Description:
Cisco Duo's multi-factor authentication protects your applications by using a second means of confirmation such as a phone or token to verify user identity before granting access. Duo is designed to provide a simple, streamlined login experience for every user and every application. As a cloud-based solution, it integrates easily with your existing technology.

3 Key Facts:
1. verify identity in seconds.
2. protect any application on any device.
3. deploy Duo easily in any environment


Duo Access

Description:
A true "zero trust" strategy changes the access or trust level based on contextual data about the user or device requesting access. It also restricts access only to users who really need it. With Duo, you can set detailed policies in minutes through a simple, intuitive administrator dashboard and manage rules globally or for specific applications or user groups.

3 Key Facts:
1 Respond immediately to changing user contexts.
2. protect specific apps and networks.
3. fully customize security policies.


Duo Beyond

Description:
With Duo Beyond, you can identify corporate and private devices with simple certificate provisioning, block untrusted endpoints and give your users secure access to internal applications without using VPNs.

3 Key Facts:
1. differentiate between corporate and personal devices
2 Restrict access to confidential data to corporate devices only.
3 Restrict remote access to specific applications without exposing the network

Show More

Product Expert