Umbrella DUO Multi-Factor Authentication

martinmarino8 46 views 22 slides Aug 31, 2024
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

Umbrella DUO MFA


Slide Content

Cisco Umbrella & Duo Multi-Factor Authentication

Users and apps have adopted the cloud… 50% of the workforce roaming 85%  of corporate users bypass VPN >50% of business apps will be SaaS 79% of branch offices are shifting to DIA …security must, too. Security controls must shift to the cloud Source: Cisco Secure Internet Gateway Survey, ESG Research Survey, January 2019

Key security challenges Compromised accounts Cloud apps and shadow IT Malware and other threats

OPEN Simple, effective, powerful protection Cisco Umbrella First line of defense against threats on the internet wherever users go Duo Security, Multi-Factor Authentication (MFA) Verify the identify of all users before granting access to corporate applications The best in cloud-delivered security

Secure access to the internet and applications — everywhere Benefits Uncover shadow IT Secure the use of sanctioned cloud applications Protect against phishing and other threats

Get started today Duo Security Multi-Factor Authentication (MFA) 30-day free trial: signup.duo.com Cisco Umbrella Secure Internet Gateway (SIG) 14-day free trial: signup.umbrella.com

Umbrella Secure access to the internet Stealthwatch Cloud Secure public cloud Duo Secure access to any app Cisco’s Cloud Security Portfolio AMP for Endpoints Secure endpoints from threats Cloudlock & Email Security Secure usage of cloud apps

Cisco Umbrella Built into the foundation of the internet Intelligence to see attacks before launched Visibility and protection everywhere Enterprise-wide deployment in minutes Integrations to amplify existing investments Cloud security platform Malware C2 Callbacks Phishing 208.67.222.222

Malware C2 Callbacks Phishing Benefits Block malware before it hits the enterprise Contains malware if already inside Internet access is faster Provision globally in minutes Where does Umbrella fit? HQ Sandbox NGFW Proxy Netflow AV AV BRANCH Router/UTM AV AV Umbrella First line AV ROAMING

It all starts with DNS Umbrella Cisco.com 72.163.4.161 DNS = Domain Name System First step in connecting to the internet Precedes file execution and IP connection Used by all devices Port agnostic

Built into foundation of the internet Umbrella provides: Connection for safe requests Prevention for user and malware-initiated connections Proxy inspection for risky domains Safe request Blocked request

Data Cisco Talos feed of malicious domains, IPs, and URLs Umbrella DNS data — 175B requests per day Security researchers Industry renown researchers Build models that can automatically classify and score domains and IPs Models Dozens of models continuously analyze millions of live events per second Automatically uncover malware, ransomware, and other threats Intelligence to see attacks before launched

Solve the three biggest challenges related to shadow IT Umbrella App Discovery and Blocking Visibility App and risk insight Optimization and blocking

Enterprise-wide coverage in minutes, not months ANY DEVICE ON NETWORK ROAMING / MOBILE On-network coverage With one setting change Integrated with Cisco SD-WAN, Cisco ISR 1K and 4K series, Cisco Meraki MR, and Cisco WLAN controllers Off-network laptop coverage With AnyConnect VPN client integration Or with any VPN using lightweight Umbrella client Or with Umbrella Chromebook client Off-network mobile coverage With Cisco Security Connector BRANCH OFFICES

World’s Easiest and Most Secure MFA Instantly integrates with all apps Users self-enroll in minutes Users authenticate in seconds; no codes to enter

REST APIS WEB SDK RADIUS SAML OIDC Custom VPN RA SSO RRAS Multicloud Email/MSFT On- Prem Start Here Then Expand Integration documents are available at duo.com /docs Duo MFA Supports Your Work Applications

Duo Access for Adaptive MFA Easily enforce contextual policies based on security risks of each application

Compromised Devices Can Access Your Data of vulnerabilities exploited will be ones known by security team for at least one year (through 2021) Source: Gartner, Dale Gardner, 2018 Security Summit 99 % Admin lack time to patch all corporate (managed) devices End users access data with personal (unmanaged) devices End users don’t want admins to take control of personal devices

Verify Trust for Any Device Limit Access to Compliant Devices Identify corporate-owned & BYO devices Unified Device Visibility for laptops, desktops and mobile Supports all platforms Windows, MacOS , iOS , & Android

Why Customers Choose Duo? Ease of use Lower TCO Broadest Coverage Speed to Security “Our clinicians loved the simplicity of Duo Push to their phone or smartwatch to approve prescriptions.” Dr. CT Lin, CMIO “We went from identifying a solution to users authenticating with Duo in less than 1 week . From start to finish, the entire process was incredibly easy.” Mike Fleckenstein, CIO “We have over 300K employees enrolled with Duo accessing hundreds of apps. It has been one of the most successful projects at Ohio State.” Helen Patton, CI S O “We have reduced the number of help desk requests by more than 75% since deploying Duo’s MFA.” Steve Grzybinski , Dir. of Security
Tags