SlidePub
Home
Categories
Login
Register
Home
Technology
Cisco Duo 2024 Cisco Duo 2024 Cisco Duo 2024
Cisco Duo 2024 Cisco Duo 2024 Cisco Duo 2024
MichaelLee15927
270 views
23 slides
Mar 08, 2025
Slide
1
of 23
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
About This Presentation
Cisco Duo 2024
Size:
682.8 KB
Language:
en
Added:
Mar 08, 2025
Slides:
23 pages
Slide Content
Slide 1
Stronger security with Duo
Protect against breaches while enabling high productivity
Slide 2
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
2FA Compromise Led to
$34M Crypto.com Hack
The Uber Hack Shows
Push Notification 2FA Has a
Downside: It’s Too Annoying
Russian hackers exploited MFA
and ‘PrintNightmare’
vulnerability in NGO breach,
U.S. says
MFA Fatigue: How Hackers
Breached Uber, Microsoft,
and Cisco
Oktapus phishing campaign exploit MFA to
compromise 130 companies
New Gmail Attack Bypasses
Passwords
and 2FA To Read All Email
Cybercriminals Launching More
MFA Bypass Attacks
Recent attacks highlight risk in weaker MFA implementations
Slide 3
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Attackers actively
exploit identity
gaps and
weaknesses
80% of
organizations are
NOTprepared
The Perfect Storm
Identity is the
new perimeter
2023 Cisco’s Cybersecurity Readiness Index
Slide 4
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Protect against
identity
targeting attacks
Simple, easy to use,
fast to deploy &
cost-effective for all
Secure access
Duo provides what is needed
Slide 5
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Redefining Access Management
Many passwords =
bigger attack surface
Reduce
passwords
Solution
Problem
Single Sign-On
Social engineering will
be used against you
Enforce strong
authentication
Passwordless, Verified Push
Devices not even touching
your network
Verify
devices
Trusted Endpoints
Slide 6
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
SaaS, Cloud, On-premise,
Public, Private, Hybrid
Duo -leading access management solution
Risk Based Authentication
CORPORATE
RESOURCES
Authenticate Users Verify Devices Enable Access
•MFA
•Passwordless
•Employees, contractors,
vendors, external3rd
parties,etc.
•Device Trust
•Device health & compliance
•Mac, Win, iOS, Android,
BYOD
•Single Sign-On (SSO)
•VPN-less remote access
•All apps –cloud,
on-prem and private
Slide 7
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Duo’s unique approach
Unmatched Value
Stronger Security
Higher Productivity
Slide 8
8
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security that frustrates attackers
➢Automatically strengthen
authentication requirements
when risk rise
➢Leave no gaps
in protection
➢Only allow known and safe
devices to access
resources
➢Detect attacks where
visibility is nonexistent
➢Implement phishing-resistant
authentication
➢Apply Zero Trust principles
➢Stop MFA fatigue attacks
Protect against
breaches
Risk-based authentication
Trusted Endpoints
Adaptive and granular policies
FIDO2 Enforcement
Trust Monitor & Instant user triggered alerts
Verified Duo Push
Stronger Security
Slide 9
9
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security that enables the business
Boost user, IT and
security productivity
Higher Productivity
➢Easy to use for Admins and
Users
➢Access resources swiftly
and easily
➢Reduce IT burden with
user self-service
➢Only require user actions
when necessary
➢Accelerate identity related
incidents detection and
investigations
Risk BasedAuthentication
Comprehensiveauthentication logs
Single Sign-on
VPN-less remote access
Simple Policies
Flexibleauthentication options
User self-service
Endpointself-remediation
Passwordless
Slide 10
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Strong
Security
High
ProductivityEliminate the trade-
off
Frustrate attackers, not users
High Productivity
Strong Security
High Risk / High
Friction
Greater User
Productivity
Greater Business Security
Slide 11
11
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security made easy
➢Work with what you have
➢Fast speed to security
➢Seamlessly start Zero Trust
journey
➢Reduce IT costs and overhead
➢Cover any use cases with a
single solution
➢Meet compliance & insurance
requirements
Smart & secure
access management that
pays for itself
SaaS based
Zero Trust for theWorkforce
Protectany application,any user,anydevice
User self-service
Infrastructure agnostic
Unmatched Value
Policies mappedtocompliancerequirements
Slide 12
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Realize Unmatched Value
159% ROI Payback in less
than 6 months
100,000+ users
on-boarded in
5 months
Lightening fast
to deploy
Easy to use
and manage
Cost effective
Slide 13
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Duo Capabilities Deep Dive
Slide 14
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
SaaS, Cloud, On-premise,
Public, Private, Hybrid
How Duo delivers stronger security, higher
productivity and unmatched value
Risk Based Authentication
CORPORATE
RESOURCES
Authenticate Users Verify Devices Enable Access
•MFA
•Passwordless
•Employees, contractors,
vendors, external3rd
parties,etc.
•Device Trust
•Device health & compliance
•Mac, Win, iOS, Android,
BYOD
•Single Sign-On (SSO)
•VPN-less remote access
•All apps –cloud,
on-prem and private
Slide 15
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Verify users are who they say they
are
Authenticate Users
Provide Strong Multi-
Factor Authentication
Protects against
unauthorized access
using valid credentials
Quickly deploy and be
protected
Cloud native and
designed to be user
friendly from the start,
Duo allows any IT
professional to
implement at lightning
speed
Implement
Passwordless
Increase security and
user productivity by
logging in without a
password
Prevent Push
Phishing Attacks
Ensures users don’t
fall victim
to push
phishing attacks
© 2024 Ci sco and/ or i t s af f iliates.
Al l ri ght s reserved. Ci sco Conf i dential.
Slide 16
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Verify the trustworthiness devices
before granting access
Verify Devices
Assess Security
Posture
Deny access to
compromised or out
of compliance
devices
Verify Endpoint
Trust
Block access from
unmanaged and
unknown devices
Guide
Self-Remediation
Eliminate vulnerabilities
and lower IT costs by
empowering users to
remediate their device
Provide Complete
Visibility
Gain complete visibility
into all laptops and mobile
devices accessing your
resources
© 2024 Ci sco and/ or i t s af f iliates.
Al l ri ght s reserved. Ci sco Conf i dential.
Check Device Health
Slide 17
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Block attackers by only allowing
registered and managed devices to gain
access to corporate resources
Trusted Endpoints
Block Attackers
Only allow registered or
managed devices to gain
access to corporate apps
and resources
Cover BYOD
Safely allow BYOD and
3rd party devices
without requiring
Mobile Device
Management software
Control Device
Access
Give organizations
control over which
devices canaccess
corporate apps and
resources
Mitigate Risk
When limited
authenticator options
are available
Corporate
Managed Device
Registered
Device
Unknown
Device
We’re sorry.
Access is not
allowed.
LEVEL OF TRUST
© 2024 Ci sco and/ or i t s af f iliates.
Al l ri ght s reserved. Ci sco Conf i dential.
Slide 18
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Risk-Based Authentication
Device Trust
Location (IP)
Known Attack Patterns
Block
Verified
Duo Push
Duo Push
2FA
No Re-Auth
Required
FIDO2
Authenticator
Increases user productivity
without compromisingsecurity
CORPORATE
RESOURCES
AUTHENTICATION
REQUIREMENT
RISK SIGNAL ANALYSIS
Wi-Fi Fingerprint
LEVEL OF
TRUST
Dynamically adjust requirements based on risk level
Slide 19
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Simplify user experience while easily controlling who can
access which corporate applications
Enable Access
Secure any
corporate application
Covers the widest array and
unlimited number of applications
Single Sign-on
Allow users to login only once
to access multiple applications
Provide VPN-less
Remote Access
Enable users to securely and easily
access on-premise resources
Slide 20
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Why Duo
Slide 21
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Duo Essentials Duo Advantage Duo Premier
•Passwordlessauthentication
•Muti-Factor authentication
•Single Sign-On
•Trusted Endpoints
•Unlimitedapplications
•Adaptive authentication
•Risk-based authentication
•Added security:
•Device visibility, health check and
remediation
•Anomalous login detection
•Attack patterns detection
•Secure VPN-less
remote access for internal and
private apps
Everything needed to
secure access and boost user
productivity
Higher security and
user productivity with risk-based
authentication, device health
checks and visibility
Highest security and user
productivity with easy access and
protection for
private resources
Slide 22
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security first, not identity first
Protect against modern identity-based
attacks
The user experience
Easy to manage, easy to use and self-
remediate
Secure more
Apps / Devices / BYOD / Contractors
Speed to Security
Hours to integrate
Everything needed all in one
MFA, SSO, Passwordless, Trusted Endpoints
and more
Why do clients choose Duo
1
2
3
4
Higher Productivity
Stronger Security
Unmatched Value
Stronger Security, Higher Productivity
& Unmatched Value
5 Unmatched Value
Tags
Categories
Technology
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
270
Slides
23
Age
267 days
Related Slideshows
11
8-top-ai-courses-for-customer-support-representatives-in-2025.pptx
JeroenErne2
44 views
10
7-essential-ai-courses-for-call-center-supervisors-in-2025.pptx
JeroenErne2
44 views
13
25-essential-ai-courses-for-user-support-specialists-in-2025.pptx
JeroenErne2
36 views
11
8-essential-ai-courses-for-insurance-customer-service-representatives-in-2025.pptx
JeroenErne2
33 views
21
Know for Certain
DaveSinNM
19 views
17
PPT OPD LES 3ertt4t4tqqqe23e3e3rq2qq232.pptx
novasedanayoga46
23 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-23)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better