Cisco Secure Access by Duo

Cisco Secure Access by Duo

Customer Verified
Top Rated
About TrustRadius Scoring
Score 9.0 out of 100
Top Rated
Cisco Secure Access by Duo

Overview

What is Cisco Secure Access by Duo?

Cisco Secure Access, by Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.
Read more

Recent Reviews

Duo Security

10 out of 10
August 12, 2022
Duo has helped solved our issues with compromised accounts. This implementation has been key in improving security measures here. My only …
Continue reading
Read all reviews

How Cisco Secure Access by Duo Differs From Its Competitors

Identity Verification

Yes, it benefits greatly. We moved over to OneLogin about two years ago and Duo has allowed for our two-step authentication to be easy. We also use it for our p-card and I use it personally for my school login.
Continue reading

Identity Verification

I am sure it has helped protect our personal and client data. I have never had it prompt me when I was not the one attempting to gain access but it is a comfort to know if someone did try to hack me I would know.
Continue reading

Identity Verification

To my knowledge, there has been none to date. Though I obviously cannot be certain, a large part of this is due to the additional layer of security that Cisco Secure Access by Duo provides. With proper training as to its purpose (i.e., if you see a request that you did not initiate please notify …
Continue reading

Identity Verification

We have a single MFA solution for almost all local and remote access as well as cloud access. There is less to maintain. Basic credential theft attacks cannot be effective because the attacker cannot meet the MFA challenge to launch the attack.
Continue reading

Identity Verification

Our company suffered a breach in the past. After that incident, we decided to incorporate Cisco into our routine. Ever since we started using it no breaches have occurred and we have been able to protect sensitive data from hackers. So far we haven’t had any issues with breaches again.
Continue reading

Identity Verification

Earlier with only credentials (not MFA) there were chances of unethical activities either from employees or external parties. There was no control on the same. After implementation of Cisco Secure Access by Duo user has to validate his login on Duo app also along with credentials so automatically …
Continue reading

Identity Verification

We have not a single access breach from the users who have been added to this system, it has been a piece of relief. I strongly feel that tools like these are extremely underutilized and have many more benefits than are often realized. End users tend to be the largest risk with security, Duo …
Continue reading

Identity Verification

Since using this solution, there haven't been any significant breaches; however, we didn't have any before either. I recommend this to organizations concerned about security or need processes to comply with their specific industry best practices.
Continue reading

Resilience

After years of use, I have never had a cyber security incident related to Duo's vulnerability or via our team's multi-factor authentication using Duo. The solution has been rock-solid, easy to use, and scalable for our needs.
Continue reading

Leadership in Resilience

Leaders should be better connected with IT and be made aware of possible issues through greater visibility and understanding of network infrastructures and information flows, potential vulnerabilities, and areas of concern. Leaders can be a conduit to the broader teams to ensure cyber security is …
Continue reading

Resilience

Resilience is very important since your business depends on the service being up and if it is down, the issue is resolved asap. One of the main reason to using Cisco Duo is their reputation for reliability and the support they put behind their product.
Continue reading

Leadership in Resilience

By doing their due diligence in choosing a vendor that have shown and proven their worth in the cyber security arena. Always look at new technology and company annually and never be satisfied with what you already have since it is constantly changing.
Continue reading

Identity Verification

The company has benefited from using Cisco's MFA to prevent data breaches by ensuring that all logins to user workstations are secure and are only enabled after being verified through two-factor authentication. This has helped protect overall IT security across the network. The company has also …
Continue reading

Resilience

Resilience matters a great deal in cyber security because the value of cyber security tools and software lies in how they perform when the organization is under threat of a cyber security attack. If the tool is resilient and managers to work, function, and protect the organization during the …
Continue reading

Leadership in Resilience

In order to build more cyber security resilience within their organization, leaders should focus on building the infrastructure necessary to strengthen the organization's cyber security. This involves having the latest software and hardware: software such as IT tools and firewalls, and hardware …
Continue reading

Identity Verification

To my knowledge, the organization hasn't had any data breaches, either with on-premises devices or cloud-based applications.
Continue reading

Resilience

Resilience is foundational to the cyber security context. We handle confidential client information and internal work product on a daily basis, so the ability to anticipate any potential disruptions, identify them as they occur, and quickly recover if they succeed is essential to our work. A …
Continue reading

Leadership in Resilience

I think there's a lot of room for improvement on the anticipation and prevention side of an organization's resilience approach. The idea of a successful intrusion looms large in a lot of people's minds, so there are usually solid systems in place to correct and recover from such an event. Folks …
Continue reading

Identity Verification

It is hard to measure the exact cost that has been saved since any security breaches are prevented, but I have seen firsthand how expensive and time-wasting security breaches can be for Information Technology companies. In addition to the technology and human hours costs, a lost reputation can be …
Continue reading

Resilience

Resilience is a critical aspect of cyber security. Resiliency of business and their tools ensure that normal business operations can continue in the face of cyber security threats. Lack of resiliency will cause not only catastrophic results for the business but have catastrophic results for their …
Continue reading

Leadership in Resilience

Better cyber security resilience can be achieved by researching and implementing best in class malware and intrusion protection tools. Taking a layered approach to security by implementing multiple tools, can help build resiliency. If one layer or tool fails, multiple other layers remain that can …
Continue reading

Identity Verification

As so many of our employees are working remotely and accessing our network from various devices, MFA is critically essential. Since its implementation, I’m more confident about the security of accessing our data via Duo. I also think it’s a great way for my company to track the employees’ access.
I…
Continue reading

Resilience

You can’t put a price on the value of having a reliable cyber security measure in place. One easy step of using a user-friendly app to assure my company assure that no one outside of our organization can access our data is invaluable.
Continue reading

Leadership in Resilience

Keeping their employees up to date with current trends of cyber security thread. Also, mandatory training is essential, so everyone is reminded of cyber security threats and know how to avoid them.
Continue reading

Identity Verification

Our organization phased out all other authentication apps for internally used cloud-based applications and solely uses Duo / Cisco Secure Access, by Duo. The integration with several cloud-based applications allows for more push notifications to be enabled, and it also includes the standard …
Continue reading

Resilience

Resilience is a by-product of redundancy. With a product like Duo, it is essential that it be available at all times. While there may be work-arounds to allow access during an outage, those essentially negate the value. Duo provides peace of mind and their resilience plays a big part of that in …
Continue reading

Leadership in Resilience

Layers. CyberSecurity should be build like an onion. When the bad actor peels back one layer, there's yet another. The more resiliency you have in your security framework, the less attractive you are to hackers. They are looking for the easiest targets first.
Continue reading

Identity Verification

We see many blocked attempts to access our systems every day. There is always the fear that someone will sign up for a service to attempt to download a coupon or sign up for a video game with the same username and password they use at work which if those external low priority systems are ever …
Continue reading

Identity Verification

Cisco Secure Access by Duo meets Compliance Requirements like PCI, NIST, and GDPR, among others. It allows minimizing security risk if there are compromised credentials trying to access critical business data. You can use push notifications, soft tokens, SMS, phone call, smartwatch wearables, …
Continue reading

Identity Verification

It has stopped thousands of attempts to access accounts without authorization. Our clients utilize on-premise Microsoft Exchange, and we also use this for OWA for Microsoft Exchange. I can't even guess how many phishing attacks for OWA logins it has prevented.
Continue reading

Identity Verification

There have been no data breaches in our environment since we implemented Duo Secure Access for Multi-Factor Authentication. The Duo does an excellent job of verifying the identity of our users and ensuring no unwanted or unknown entities are able to breach our network environment. We all feel so …
Continue reading

Identity Verification

It's important that our organization maintain a secure communication breach at all times. We handle private information that needs to be protected and having a Duo security application to maintain that secure line is imperative for the organization. Data breaches these days are the main cause of …
Continue reading

Identity Verification

We use Cisco Duo MFA with our SSO IDP which provides us extra security in case of a breach with the SSO provider. Dou also offers API capabilities that help us to automate processes like provisioning and remediation. With Duo, we can add a challenge from stilling our data and also from internal …
Continue reading

Identity Verification

Our company has benefitted greatly as during the pandemic the on-campus activities and courses had to be postponed so with everyone moving to a more cloud-based digital platform this tool was perfect to allow us to protect all the information being shared across the university. so far, we have had …
Continue reading

Identity Verification

Duo Security has enabled Organizational Agility. Duo Security has enabled a reduction in the total cost of ownership. Duo Security has improved end-user productivity & experience.
Continue reading

Identity Verification

2FA is proven to dramatically reduce the possibility of breaches. In cases where a user declines a push notification, Duo even asks if it was a mistake or if it was not the user that initiated the push (attempted breach). Yes, users can still be tired from reporting false pushes and eventually …
Continue reading

Identity Verification

This has helped to keep remote access to our network more secure. It would keep a laptop with stored VPN or browser-based OWA credentials (which we discourage) from being able to connect without approval from the device owner in the case it was stolen. This has seemed to work very well with only a …
Continue reading

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons

Video Reviews

4 videos

User Review: Cisco Secure Access Helps Meet Company Cyber Security Requirements
01:42
User Review: Cisco Secure Access Allows Company Peace of Mind With Protection
01:51
User Review: Cisco Secure Access by Duo Is Used As A Simple Tool To Provide Safe Access to Accounts
02:32
Return to navigation

Pricing

View all pricing

MFA

$3.00

Cloud
Per User Per Month

Access

$6.00

Cloud
Per User Per Month

Beyond

$9.00

Cloud
Per User Per Month

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://duo.com/pricing?utm_source=trus…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services
Return to navigation

Product Details

What is Cisco Secure Access by Duo?

Cisco Secure Access, by Duo, now part of Cisco, is presented as a solution to protect applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Cisco Secure Access is engineered to provide a simple, streamlined login experience for every user and application, and as a cloud-based solution, it integrates with existing technology.

Cisco Secure Access by Duo Competitors

Cisco Secure Access by Duo Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Cisco Secure Access, by Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

Google Authenticator, WatchGuard AuthPoint, and The Okta Identity Cloud are common alternatives for Cisco Secure Access by Duo.

Reviewers rate Availability highest, with a score of 9.5.

The most common users of Cisco Secure Access by Duo are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

(1-8 of 8)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Implementation was straight forward and you can isolate different scenarios in order to test new application setup or add to an existing setup. Gui interface is pretty easy to understand and follow. I had no experience with Duo and still manage to easily set up new policies and rules.
Score 8 out of 10
Vetted Review
Verified User
I was very satisfied with the implementation of Cisco Secure Access by Duo. I have found this tool to be reliable and functional, serving the purpose it is intended for: establishing multi factor authentication and securing access to services within the organization. The tool is easy to use and is secure and reliable, and it was easy to set up for all users, thus the implementation was a success!
Score 9 out of 10
Vetted Review
Verified User
It's always a pain to switch onto a new two-factor authentication system, but implementing Cisco Secure Access by Duo was fairly smooth sailing. Again, the smoothness of the mobile platform and the ability to integrate across multiple platforms were both sources of significant value here.
Score 9 out of 10
Vetted Review
Verified User
Implementation of Cisco Secure Access by Duo was easy and intuitive. Integration of third party applications via API interface was painless. ON the few occasions that I needed to work with support to troubleshoot an issue, I have been satisfied with the level of support that was provided. All in all, the implementation process was better than many other products.
Return to navigation