Duo


When it was first established, a centralized web security approach made sense, because every business network had clear, defined security perimeters. That’s not the case anymore: your security perimeter is now where your users and their devices are, and they can be anywhere.

A zero-trust model can be used to understand which devices are company managed and which are not, and allow access based on device trust. Zero-trust creates user-centered security by taking multiple data points into consideration, instead of validating against a single criterion. By combining all of your security measures in a coordinated way to drive access policy, you are able to effectively enforce security measures on any access device, at any time and create adaptive security policies that take both the user and the device into account. Furthermore, when you combine secure connections to applications with adaptive policies, trust in user identities and trustworthiness of devices shifts access decisions from the network to the applications, which is a core component of a zero-trust security model.

For organizations of all sizes that need to protect sensitive data at scale, Duo’s trusted access solution is a user-centric zero-trust security platform for all users, all devices and all applications. Duo helps defend organizations against breaches through its easy and effective cloud-based Trusted Access product suite. The company verifies the identity of users, and the health of their devices, before granting them access to applications. Duo’s balance of security and usability has led them to be an enduring and trusted partner to thousands of customers worldwide, including Dresser-Rand, Etsy, Facebook, K-Swiss, Random House, Yelp, Zillow, Paramount Pictures and more.