Cisco Secure Access by Duo

Cisco Secure Access by Duo

Customer Verified
Top Rated
About TrustRadius Scoring
Score 9.0 out of 100
Top Rated
Cisco Secure Access by Duo

Overview

What is Cisco Secure Access by Duo?

Cisco Secure Access, by Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.
Read more

Recent Reviews

Duo Security

10 out of 10
August 12, 2022
Duo has helped solved our issues with compromised accounts. This implementation has been key in improving security measures here. My only …
Continue reading
Read all reviews

How Cisco Secure Access by Duo Differs From Its Competitors

Identity Verification

Yes, it benefits greatly. We moved over to OneLogin about two years ago and Duo has allowed for our two-step authentication to be easy. We also use it for our p-card and I use it personally for my school login.
Continue reading

Identity Verification

I am sure it has helped protect our personal and client data. I have never had it prompt me when I was not the one attempting to gain access but it is a comfort to know if someone did try to hack me I would know.
Continue reading

Identity Verification

To my knowledge, there has been none to date. Though I obviously cannot be certain, a large part of this is due to the additional layer of security that Cisco Secure Access by Duo provides. With proper training as to its purpose (i.e., if you see a request that you did not initiate please notify …
Continue reading

Identity Verification

We have a single MFA solution for almost all local and remote access as well as cloud access. There is less to maintain. Basic credential theft attacks cannot be effective because the attacker cannot meet the MFA challenge to launch the attack.
Continue reading

Identity Verification

Our company suffered a breach in the past. After that incident, we decided to incorporate Cisco into our routine. Ever since we started using it no breaches have occurred and we have been able to protect sensitive data from hackers. So far we haven’t had any issues with breaches again.
Continue reading

Identity Verification

Earlier with only credentials (not MFA) there were chances of unethical activities either from employees or external parties. There was no control on the same. After implementation of Cisco Secure Access by Duo user has to validate his login on Duo app also along with credentials so automatically …
Continue reading

Identity Verification

We have not a single access breach from the users who have been added to this system, it has been a piece of relief. I strongly feel that tools like these are extremely underutilized and have many more benefits than are often realized. End users tend to be the largest risk with security, Duo …
Continue reading

Identity Verification

Since using this solution, there haven't been any significant breaches; however, we didn't have any before either. I recommend this to organizations concerned about security or need processes to comply with their specific industry best practices.
Continue reading

Resilience

After years of use, I have never had a cyber security incident related to Duo's vulnerability or via our team's multi-factor authentication using Duo. The solution has been rock-solid, easy to use, and scalable for our needs.
Continue reading

Leadership in Resilience

Leaders should be better connected with IT and be made aware of possible issues through greater visibility and understanding of network infrastructures and information flows, potential vulnerabilities, and areas of concern. Leaders can be a conduit to the broader teams to ensure cyber security is …
Continue reading

Resilience

Resilience is very important since your business depends on the service being up and if it is down, the issue is resolved asap. One of the main reason to using Cisco Duo is their reputation for reliability and the support they put behind their product.
Continue reading

Leadership in Resilience

By doing their due diligence in choosing a vendor that have shown and proven their worth in the cyber security arena. Always look at new technology and company annually and never be satisfied with what you already have since it is constantly changing.
Continue reading

Identity Verification

The company has benefited from using Cisco's MFA to prevent data breaches by ensuring that all logins to user workstations are secure and are only enabled after being verified through two-factor authentication. This has helped protect overall IT security across the network. The company has also …
Continue reading

Resilience

Resilience matters a great deal in cyber security because the value of cyber security tools and software lies in how they perform when the organization is under threat of a cyber security attack. If the tool is resilient and managers to work, function, and protect the organization during the …
Continue reading

Leadership in Resilience

In order to build more cyber security resilience within their organization, leaders should focus on building the infrastructure necessary to strengthen the organization's cyber security. This involves having the latest software and hardware: software such as IT tools and firewalls, and hardware …
Continue reading

Identity Verification

To my knowledge, the organization hasn't had any data breaches, either with on-premises devices or cloud-based applications.
Continue reading

Resilience

Resilience is foundational to the cyber security context. We handle confidential client information and internal work product on a daily basis, so the ability to anticipate any potential disruptions, identify them as they occur, and quickly recover if they succeed is essential to our work. A …
Continue reading

Leadership in Resilience

I think there's a lot of room for improvement on the anticipation and prevention side of an organization's resilience approach. The idea of a successful intrusion looms large in a lot of people's minds, so there are usually solid systems in place to correct and recover from such an event. Folks …
Continue reading

Identity Verification

It is hard to measure the exact cost that has been saved since any security breaches are prevented, but I have seen firsthand how expensive and time-wasting security breaches can be for Information Technology companies. In addition to the technology and human hours costs, a lost reputation can be …
Continue reading

Resilience

Resilience is a critical aspect of cyber security. Resiliency of business and their tools ensure that normal business operations can continue in the face of cyber security threats. Lack of resiliency will cause not only catastrophic results for the business but have catastrophic results for their …
Continue reading

Leadership in Resilience

Better cyber security resilience can be achieved by researching and implementing best in class malware and intrusion protection tools. Taking a layered approach to security by implementing multiple tools, can help build resiliency. If one layer or tool fails, multiple other layers remain that can …
Continue reading

Identity Verification

As so many of our employees are working remotely and accessing our network from various devices, MFA is critically essential. Since its implementation, I’m more confident about the security of accessing our data via Duo. I also think it’s a great way for my company to track the employees’ access.
I…
Continue reading

Resilience

You can’t put a price on the value of having a reliable cyber security measure in place. One easy step of using a user-friendly app to assure my company assure that no one outside of our organization can access our data is invaluable.
Continue reading

Leadership in Resilience

Keeping their employees up to date with current trends of cyber security thread. Also, mandatory training is essential, so everyone is reminded of cyber security threats and know how to avoid them.
Continue reading

Identity Verification

Our organization phased out all other authentication apps for internally used cloud-based applications and solely uses Duo / Cisco Secure Access, by Duo. The integration with several cloud-based applications allows for more push notifications to be enabled, and it also includes the standard …
Continue reading

Resilience

Resilience is a by-product of redundancy. With a product like Duo, it is essential that it be available at all times. While there may be work-arounds to allow access during an outage, those essentially negate the value. Duo provides peace of mind and their resilience plays a big part of that in …
Continue reading

Leadership in Resilience

Layers. CyberSecurity should be build like an onion. When the bad actor peels back one layer, there's yet another. The more resiliency you have in your security framework, the less attractive you are to hackers. They are looking for the easiest targets first.
Continue reading

Identity Verification

We see many blocked attempts to access our systems every day. There is always the fear that someone will sign up for a service to attempt to download a coupon or sign up for a video game with the same username and password they use at work which if those external low priority systems are ever …
Continue reading

Identity Verification

Cisco Secure Access by Duo meets Compliance Requirements like PCI, NIST, and GDPR, among others. It allows minimizing security risk if there are compromised credentials trying to access critical business data. You can use push notifications, soft tokens, SMS, phone call, smartwatch wearables, …
Continue reading

Identity Verification

It has stopped thousands of attempts to access accounts without authorization. Our clients utilize on-premise Microsoft Exchange, and we also use this for OWA for Microsoft Exchange. I can't even guess how many phishing attacks for OWA logins it has prevented.
Continue reading

Identity Verification

There have been no data breaches in our environment since we implemented Duo Secure Access for Multi-Factor Authentication. The Duo does an excellent job of verifying the identity of our users and ensuring no unwanted or unknown entities are able to breach our network environment. We all feel so …
Continue reading

Identity Verification

It's important that our organization maintain a secure communication breach at all times. We handle private information that needs to be protected and having a Duo security application to maintain that secure line is imperative for the organization. Data breaches these days are the main cause of …
Continue reading

Identity Verification

We use Cisco Duo MFA with our SSO IDP which provides us extra security in case of a breach with the SSO provider. Dou also offers API capabilities that help us to automate processes like provisioning and remediation. With Duo, we can add a challenge from stilling our data and also from internal …
Continue reading

Identity Verification

Our company has benefitted greatly as during the pandemic the on-campus activities and courses had to be postponed so with everyone moving to a more cloud-based digital platform this tool was perfect to allow us to protect all the information being shared across the university. so far, we have had …
Continue reading

Identity Verification

Duo Security has enabled Organizational Agility. Duo Security has enabled a reduction in the total cost of ownership. Duo Security has improved end-user productivity & experience.
Continue reading

Identity Verification

2FA is proven to dramatically reduce the possibility of breaches. In cases where a user declines a push notification, Duo even asks if it was a mistake or if it was not the user that initiated the push (attempted breach). Yes, users can still be tired from reporting false pushes and eventually …
Continue reading

Identity Verification

This has helped to keep remote access to our network more secure. It would keep a laptop with stored VPN or browser-based OWA credentials (which we discourage) from being able to connect without approval from the device owner in the case it was stolen. This has seemed to work very well with only a …
Continue reading

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons

Video Reviews

4 videos

User Review: Cisco Secure Access Helps Meet Company Cyber Security Requirements
01:42
User Review: Cisco Secure Access Allows Company Peace of Mind With Protection
01:51
User Review: Cisco Secure Access by Duo Is Used As A Simple Tool To Provide Safe Access to Accounts
02:32
Return to navigation

Pricing

View all pricing

MFA

$3.00

Cloud
Per User Per Month

Access

$6.00

Cloud
Per User Per Month

Beyond

$9.00

Cloud
Per User Per Month

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://duo.com/pricing?utm_source=trus…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services
Return to navigation

Product Details

What is Cisco Secure Access by Duo?

Cisco Secure Access, by Duo, now part of Cisco, is presented as a solution to protect applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Cisco Secure Access is engineered to provide a simple, streamlined login experience for every user and application, and as a cloud-based solution, it integrates with existing technology.

Cisco Secure Access by Duo Competitors

Cisco Secure Access by Duo Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Cisco Secure Access, by Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

Google Authenticator, WatchGuard AuthPoint, and The Okta Identity Cloud are common alternatives for Cisco Secure Access by Duo.

Reviewers rate Availability highest, with a score of 9.5.

The most common users of Cisco Secure Access by Duo are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

(1-8 of 8)
Companies can't remove reviews or game the system. Here's why
Dustin Hovey | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
There are a lot of competing solutions on the market; however, Duo "just works", and there is little to no learning curve for the new members to be acclimated to it. As long as that continues I see it as the preferred option moving forward.
Score 8 out of 10
Vetted Review
Verified User
I am very likely to renew my use of Cisco Secure Access by Duo because I find this tool to be highly functional and a great tool for two factor authentication and login into services. I find that this tool is reliable, it is easy to use and is portable, working effectively with both smartphones and PCs, and thus I will keep using this software.
Score 9 out of 10
Vetted Review
Verified User
Cisco Secure Access by Duo covers the essential functions of our cybersecurity needs. I especially value how it can integrate with multiple different platforms that folks at our organization use on a regular basis, which makes it significantly more user friendly and convenient without compromising quality. It also excels at mobile integration.
Score 9 out of 10
Vetted Review
Verified User
Cisco Secure Access by Duo has helped secure the cyber security posture of our business by adding a second authentication factor on logins to our systems. Push two factor authentication in Cisco Secure Access by Duo offers a method of two factor authentication that is more secure than text message or QR code two factor authentication.
Return to navigation