Duo helps MFA authorization with a lightweight but robust app!
May 04, 2021
Duo helps MFA authorization with a lightweight but robust app!
Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with Duo / Cisco Secure Access, by Duo
Through Duo / Cisco Secure Access, by Duo, we have a multi-factor authentication mechanism in place which helps in protecting our applications and data from unauthorized access by letting in only authorized users into our systems. Duo / Cisco Secure Access, by Duo, helps identify and confirm user accounts on VPNs, users using a private network in a remote work setup, and also gauges the device health in scenarios of a probable data breach attack. With remote work being the norm, users are on a VPN or without VPN, and we want to ensure our data and our enterprise apps have no access from outsiders who are not meant to see our data.
- Quick multi-factor authentication setup and verification
- Establishing device trust
- Monitoring device health at regular intervals
- Protection against threats like phishing
- Pricing model can be simplified
- With Cisco's acquisition, things are not so light weight but they come with a easy coupling of Cisco apps and Cisco's security measures
- Not all users find it easy to set up multi-factor authentication on their mobile devices and one always needs to have the mobile devices by their side when previously it wasn't the case
- Cisco's acquisition has certainly helped the enterprise app's architecture to be more robust
- With Cisco acquiring Duo, integration activities for the application portfolio get a more secure standpoint
- Easy to set up even though the user may want to access the systems on different devices--they're always having to go through Duo's multi-factor authentication
We're mostly on cloud and we have multi-cloud systems in places ranging from ones supported by Azure to the ones supported by AWS. Now all of our users are on remote networks and they either use VPN or they don't with their systems. With VPN, it becomes easier due to two reasons, one is that we use Cisco AnyConnect Secure Mobility Client and being a VPN, it is easy for our systems to track data. But on a private network, we're able to set contextual access rules and thus safe pass only valid users.
When we first started using Duo / Cisco Secure Access, by Duo, the setup part wasn't so easy, as various users preferred different ways to do their multi-factor authentication and log into our systems. Also some users who are not daily users of our systems had the challenge of understanding how or why to use multi-factor authentication. Through various documents, and informational slides about data security, Duo / Cisco Secure Access, by Duo was able to educate our users and help them start using it in phase wise manner.
- The Okta Identity Cloud, WatchGuard AuthPoint, OneLogin, Azure Multi-Factor Authentication (Discontinued) and IBM Security Verify (formerly ibm cloud identity)
As we were on Cisco VConnect mobility client, we felt the ROI of using a Cisco auth client would be much better even though when we took this decision, remote working wasn't in vogue. That's the main business reason for going with Duo / Cisco Secure Access, by Duo--a preexisting relationship.
Duo's support for zero-trust authorization and contextual rules access has been very helpful in securing our data against any threats and been the reason for sticking with it.
Duo's support for zero-trust authorization and contextual rules access has been very helpful in securing our data against any threats and been the reason for sticking with it.