Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Duo

Below you will find reports with the source of “Duo”

image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

In the 2021 Dup Trusted Access Report, we’ll explore how companies are currently securing hybrid work and what makes a solid and secure remote access strategy. (more available)
Added: June 15, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. (more available)
Added: June 15, 2022
image from The 2019 Duo Trusted Access Report

The 2019 Duo Trusted Access Report

For The 2019 Duo Trusted Access Report, our data shows that Duo customers across all industries are starting to implement zero-trust security principles to secure their workforce. (more available)
Added: June 15, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns. (more available)
Added: October 17, 2021
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications. (more available)
Added: October 17, 2018
image from Trusted Access Report 2017

Trusted Access Report 2017

This paper discusses the evolution of enterprise security.
Added: October 16, 2018
image from Trusted Access Report 2016

Trusted Access Report 2016

This paper takes a look at the current state of device security.
Added: October 15, 2018
image from The Essential Guide To Securing Remote Access

The Essential Guide To Securing Remote Access

This guide will cover the different threats to each area with real-world examples, including exploits that affect remote access software and storage, and provide solutions and security best practice recommendations to help your organization protect against a data breach. (more available)
Added: October 14, 2018
image from Duo Security's Two Factor Evaluation Guide

Duo Security's Two Factor Evaluation Guide

This guide provides comprehensive help for enterprises seeking to evaluate two factor authentication services.
Added: October 13, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.
Added: October 12, 2018
© Cyentia Institute 2022
Library updated: July 5, 2022 04:08 UTC (build d6199b1)