We are partnered with Duo part of Cisco to deliver best in breed Adaptive MFA across your company to protect almost any application and enforce contextual policies.
What Multi-factor authentication is & why you need it
Today establishing end user and device trust is becoming increasingly difficult. With critical business applications available both on premise as well as SaAs and employees and contractors accessing these apps from BYOD and mobile devices ensuring a user is who they say they are and protecting your data is a business decision makers worst nightmare.
Attackers often access these business critical systems by directly accessing these applications through compromised device or password. Additional security layers are now required to ensure accounts cannot be easily compromised.
That’s where MFA (“Multi Factor Authentication”) comes in by verifying user and device trust alongside the necessary access controls. So What is MFA?
- Something you know (e.g password)
- Something you have (e.g phone)
- Something you are (e.g biometrics)
What is 2FA?
|Multi-Factor Authentication (MFA)||Duo MFA||Duo Access||Duo Beyond|
|Duo Push for iOS and Android|
|Security keys, U2F, OTP, phone callback, SMS & hardware tokens|
|Telephony credits — 100 credits/user/year|
|User self-enrollment & self-management|
|Assess user risk with phishing simulation|
|Assess corporate and personal device security hygiene|
|Monitor and identify risky devices|
|Identify corporate vs. personal devices|
|Adaptive Authentication & Policy Enforcement|
|Enforce role-based access policies|
|Enforce control based on user’s location or network|
|Enforce biometric requirements|
|Block Tor and anonymous networks|
|Control which devices can access apps, based on device hygiene|
|Limit which devices can access apps — corporate vs. personally owned|
|Automatically notify users to update their own devices|
|Secure devices without an MDM|
|Remote Access & Single Sign-On (SSO)|
|Protect and enable access for on-premises apps|
|Natively protect all cloud apps|
|Protect federated cloud apps|
|Secure access to internal web apps|
|Provide secure remote access to SSH|