Duo Security, acquired by Cisco in 2018, are an identity and access management provider known for their range of multi-factor authentication solutions designed to authenticate users, give insight into account security and provide secure access to servers and applications. Duo brings together security expertise and a strong user-centered philosophy, providing organizations with the tools they need to secure digital accounts. The services they provide are delivered across several plans and options, ranging from a free version suitable for smaller teams, up to Duo Beyond for larger organizations. Duo Beyond lets you easily identify corporate vs. personal devices through certificate deployment, as well as allowing admins to block untrusted endpoints and provide users with secure access to internal applications, without the use of a VPN.
Two of Duo Beyond’s key features are Trusted Endpoints and the Duo Network Gateway. Duo’s Trusted Endpoints feature gives you the ability to define and manage the endpoints you trust and grant them secure access to your organizations applications, with policies in place that help secure this process by verifying systems via device certificates, application verification, or management status. Duo’s Network Gateway gives users access to your on-premises websites, SSH servers and web applications, without the need to manage VPN credentials, all whilst boosting login security with Duo Prompt, a two factor authentication app that allows users to choose how to verify their identity when they log in. Duo Beyond also includes all features from both Duo Access and Duo MFA, including Trust Monitor, Duo Access Gateway SSO, Duo Single Sign-On, Policy & Control, Device Insight, Endpoint Data, Directory Sync, and more.
Duo Beyond is a comprehensive identity and access management platform which expands secure access beyond typical perimeter-based network security, instead giving organizations the power to grant access to any application, from any device, to any user, all while upholding solid security hygiene. It works to reduce risk by enforcing precise policies and controls and allows your team to decide and control which users can access what application, and under what conditions. By defining access polices by user group and per application, organizations can boost security without needing to compromise end-user experience. We recommend this solution to larger organizations looking to manage the authentication and access rights of their users.