Cisco Duo 2024 Cisco Duo 2024 Cisco Duo 2024

MichaelLee15927 270 views 23 slides Mar 08, 2025
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

Cisco Duo 2024


Slide Content

Stronger security with Duo
Protect against breaches while enabling high productivity

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
2FA Compromise Led to
$34M Crypto.com Hack
The Uber Hack Shows
Push Notification 2FA Has a
Downside: It’s Too Annoying
Russian hackers exploited MFA
and ‘PrintNightmare’
vulnerability in NGO breach,
U.S. says
MFA Fatigue: How Hackers
Breached Uber, Microsoft,
and Cisco
Oktapus phishing campaign exploit MFA to
compromise 130 companies
New Gmail Attack Bypasses
Passwords
and 2FA To Read All Email
Cybercriminals Launching More
MFA Bypass Attacks
Recent attacks highlight risk in weaker MFA implementations

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Attackers actively
exploit identity
gaps and
weaknesses
80% of
organizations are
NOTprepared
The Perfect Storm
Identity is the
new perimeter
2023 Cisco’s Cybersecurity Readiness Index

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Protect against
identity
targeting attacks
Simple, easy to use,
fast to deploy &
cost-effective for all
Secure access
Duo provides what is needed

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Redefining Access Management
Many passwords =
bigger attack surface
Reduce
passwords
Solution
Problem
Single Sign-On
Social engineering will
be used against you
Enforce strong
authentication
Passwordless, Verified Push
Devices not even touching
your network
Verify
devices
Trusted Endpoints

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
SaaS, Cloud, On-premise,
Public, Private, Hybrid
Duo -leading access management solution
Risk Based Authentication
CORPORATE
RESOURCES
Authenticate Users Verify Devices Enable Access
•MFA
•Passwordless
•Employees, contractors,
vendors, external3rd
parties,etc.
•Device Trust
•Device health & compliance
•Mac, Win, iOS, Android,
BYOD
•Single Sign-On (SSO)
•VPN-less remote access
•All apps –cloud,
on-prem and private

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Duo’s unique approach
Unmatched Value
Stronger Security
Higher Productivity

8
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security that frustrates attackers
➢Automatically strengthen
authentication requirements
when risk rise
➢Leave no gaps
in protection
➢Only allow known and safe
devices to access
resources
➢Detect attacks where
visibility is nonexistent
➢Implement phishing-resistant
authentication
➢Apply Zero Trust principles
➢Stop MFA fatigue attacks
Protect against
breaches
Risk-based authentication
Trusted Endpoints
Adaptive and granular policies
FIDO2 Enforcement
Trust Monitor & Instant user triggered alerts
Verified Duo Push
Stronger Security

9
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security that enables the business
Boost user, IT and
security productivity
Higher Productivity
➢Easy to use for Admins and
Users
➢Access resources swiftly
and easily
➢Reduce IT burden with
user self-service
➢Only require user actions
when necessary
➢Accelerate identity related
incidents detection and
investigations
Risk BasedAuthentication
Comprehensive​authentication logs
Single Sign-on​
VPN-less remote access
Simple Policies​
Flexible​authentication options​
User self-service
Endpoint​self-remediation
Passwordless

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Strong
Security
High
ProductivityEliminate the trade-
off
Frustrate attackers, not users
High Productivity
Strong Security
High Risk / High
Friction
Greater User
Productivity
Greater Business Security

11
© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security made easy
➢Work with what you have
➢Fast speed to security
➢Seamlessly start Zero Trust
journey
➢Reduce IT costs and overhead
➢Cover any use cases with a
single solution
➢Meet compliance & insurance
requirements
Smart & secure
access management that
pays for itself
SaaS based
Zero Trust for theWorkforce
Protectany application,any user,anydevice
User self-service
Infrastructure agnostic
Unmatched Value
Policies mappedtocompliancerequirements

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Realize Unmatched Value
159% ROI Payback in less
than 6 months
100,000+ users
on-boarded in
5 months
Lightening fast
to deploy
Easy to use
and manage
Cost effective

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Duo Capabilities Deep Dive

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
SaaS, Cloud, On-premise,
Public, Private, Hybrid
How Duo delivers stronger security, higher
productivity and unmatched value
Risk Based Authentication
CORPORATE
RESOURCES
Authenticate Users Verify Devices Enable Access
•MFA
•Passwordless
•Employees, contractors,
vendors, external3rd
parties,etc.
•Device Trust
•Device health & compliance
•Mac, Win, iOS, Android,
BYOD
•Single Sign-On (SSO)
•VPN-less remote access
•All apps –cloud,
on-prem and private

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Verify users are who they say they
are
Authenticate Users
Provide Strong Multi-
Factor Authentication
Protects against
unauthorized access
using valid credentials
Quickly deploy and be
protected
Cloud native and
designed to be user
friendly from the start,
Duo allows any IT
professional to
implement at lightning
speed
Implement
Passwordless
Increase security and
user productivity by
logging in without a
password
Prevent Push
Phishing Attacks
Ensures users don’t
fall victim
to push
phishing attacks
© 2024 Ci sco and/ or i t s af f iliates.
Al l ri ght s reserved. Ci sco Conf i dential.

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Verify the trustworthiness devices
before granting access
Verify Devices
Assess Security
Posture
Deny access to
compromised or out
of compliance
devices
Verify Endpoint
Trust
Block access from
unmanaged and
unknown devices
Guide
Self-Remediation
Eliminate vulnerabilities
and lower IT costs by
empowering users to
remediate their device
Provide Complete
Visibility
Gain complete visibility
into all laptops and mobile
devices accessing your
resources
© 2024 Ci sco and/ or i t s af f iliates.
Al l ri ght s reserved. Ci sco Conf i dential.
Check Device Health

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Block attackers by only allowing
registered and managed devices to gain
access to corporate resources
Trusted Endpoints
Block Attackers
Only allow registered or
managed devices to gain
access to corporate apps
and resources
Cover BYOD
Safely allow BYOD and
3rd party devices
without requiring
Mobile Device
Management software
Control Device
Access
Give organizations
control over which
devices canaccess
corporate apps and
resources
Mitigate Risk
When limited
authenticator options
are available
Corporate
Managed Device
Registered
Device
Unknown
Device
We’re sorry.
Access is not
allowed.
LEVEL OF TRUST
© 2024 Ci sco and/ or i t s af f iliates.
Al l ri ght s reserved. Ci sco Conf i dential.

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Risk-Based Authentication
Device Trust
Location (IP)
Known Attack Patterns
Block
Verified
Duo Push
Duo Push
2FA
No Re-Auth
Required
FIDO2
Authenticator
Increases user productivity
without compromisingsecurity
CORPORATE
RESOURCES
AUTHENTICATION
REQUIREMENT
RISK SIGNAL ANALYSIS
Wi-Fi Fingerprint
LEVEL OF
TRUST
Dynamically adjust requirements based on risk level

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Simplify user experience while easily controlling who can
access which corporate applications
Enable Access
Secure any
corporate application
Covers the widest array and
unlimited number of applications
Single Sign-on
Allow users to login only once
to access multiple applications
Provide VPN-less
Remote Access
Enable users to securely and easily
access on-premise resources

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Why Duo

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Duo Essentials Duo Advantage Duo Premier
•Passwordlessauthentication
•Muti-Factor authentication
•Single Sign-On
•Trusted Endpoints
•Unlimitedapplications
•Adaptive authentication
•Risk-based authentication
•Added security:
•Device visibility, health check and
remediation
•Anomalous login detection
•Attack patterns detection
•Secure VPN-less
remote access for internal and
private apps
Everything needed to
secure access and boost user
productivity
Higher security and
user productivity with risk-based
authentication, device health
checks and visibility
Highest security and user
productivity with easy access and
protection for
private resources

© 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential. © 2024 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential.
Security first, not identity first
Protect against modern identity-based
attacks
The user experience
Easy to manage, easy to use and self-
remediate
Secure more
Apps / Devices / BYOD / Contractors
Speed to Security
Hours to integrate
Everything needed all in one
MFA, SSO, Passwordless, Trusted Endpoints
and more
Why do clients choose Duo
1
2
3
4
Higher Productivity
Stronger Security
Unmatched Value
Stronger Security, Higher Productivity
& Unmatched Value
5 Unmatched Value
Tags