Protecting your users and applications has never been more important.
2020 has seen an unfathomable shift in how businesses are operating, employees are working, and cloud / on-premise applications are being accessed.
So how are users connecting to applications?
Bill Gates famously stated in 2004 that the end of passwords was near but here we are 16 years later, and it doesn’t look as though the traditional password is going away any time soon.
A study has shown that 59% of 2000 people surveyed across UK, Germany United States and France use the same password across all their personal and work accounts and that 81% of all hacking-related breaches are caused by compromised passwords.
Securing applications & employees
With so many people using the same password across multiple applications it is only a matter of time before a password becomes compromised. Check out the table below for sizeable breaches in the last several years.
Traditionally applications would be secured through a token-based 2FA solution such an RSA SecurID and while these have on the whole worked well for large enterprise organisations the complexity and financial cost of traditional 2FA have meant that this is not a viable option for small to mid-size organisations.
Who wants to be carrying a separate piece of hardware around with them everywhere they go to be able to access the applications they need?
Roll out Cisco DUO
Cisco DUO makes 2FA simple, easy and secure. Take the one thing that you’re most likely to have on your person anywhere you go and make it your secondary authentication device. Check out the below to see how it seamlessly secures applications.
DUO Supported applications
Everything. No seriously.
Cisco DUO can secure any application stored anywhere with full integration documentation available on securing the below applications.
|Action||CAS (Central Authentication Service)||Epic Hyperspace||Keeper Security||OneLogin||Smartsheet|
|Adobe Document Cloud||Check Point VPN||Evernote||LabTech Software||OPAQ 360||SonicWALL SRA SSL VPN|
|Aeries SIS||Cisco ASA||Expensify||LastPass||OpenVPN||Sophos UTM|
|Aha!||Cisco ASA SSL VPN||F5 BIG-IP APM||LDAP Proxy||OpenVPN Access Server||Splunk|
|Akamai Enterprise Application Access||Cisco Firepower Threat Defense VPN||F5 FirePass SSL VPN||Looker||Oracle Access Manager||StatusPage.io|
|Amazon Web Services||Cisco ISE RADIUS||Fortinet FortiGate SSL VPN||macOS||PagerDuty||SugarCRM|
|Application||Cisco RADIUS VPN||Freshdesk||Marketo||Palo Alto Networks||Sumo Logic|
|Appsian Security Platform||Cisco Umbrella||G Suite||Meraki||Palo Alto Networks Aperture||Syncplicity|
|Array SSL VPN||Cisco Webex (with Control Hub)||Generic Service Provider||Meraki RADIUS VPN||Palo Alto SSL VPN||Tableau|
|Aruba ClearPass||Cisco Webex Meetings (with Site Admin)||GitHub Enterprise||Microsoft ADFS||Partner Auth API||Tableau Online|
|Asana||Citrix Access Gateway||GitHub.com for Business||Microsoft Azure Active Directory||Partner WebSDK||Thycotic Secret Server|
|Atlassian Cloud||Citrix Gateway (NetScaler)||GoTo Apps||Microsoft OWA||PingFederate||Udemy|
|Auth API||Clarizen||Greenhouse||Microsoft RD Gateway||RADIUS||UNIX Application|
|AWS Directory Service||CloudLock||HackerOne||Microsoft RD Web||Remedyforce||UserVoice|
|BambooHR||Confluence||HackerRank for Work||Microsoft RDP||Resilient Systems||VMware View|
|Barracuda SSL VPN||CrashPlan||Heroku||Microsoft RRAS||RingCentral||Web SDK|
|Barracuda WAF||CyberArk Privileged Account Security||HipChat||Microsoft TMG||Robin||WordPress|
|Bitium||CyberArk Privileged Account Security LDAP/RADIUS||Huntress||Microsoft UAG||SailPoint API||Workday|
|Bitwarden||Datadog||Igloo||Monday||SailPoint Web||Workplace by Facebook|
|Bomgar||Device Management Portal||Jamf Pro||Namely||Samanage||Zoom|
|Bonusly||DigiCert||Jenzabar One||NetDocuments||Sauce Labs|
|Canvas||Drupal||Juniper SSL VPN||Office 365||Signal Sciences|
5 pillars of trust.
- Establish User Trust by verifying their identity before any access is given to applications or resources.
- Gain visibility into what devices are being used to access applications and resources.
- Ensure the devices (Corporate/BYOD) that are being used are trustworthy and meet your security requirements.
- Enforce Adaptive Policies based on user, device and location to protect application and resource access.
- Enable a uniform secure way of accessing all applications
Find out more about DUO here – Re-solution Cisco DUO
For instant online pricing and for a free trial simply visit the below.