Eliminate Passwords and Achieve Phishing-Resistant Authentication with Duo

Logo
Presented by

Cisco Duo Product Marketing Manager, Ganesh Umapathy and Sales Engineer, Eddie Caballero

About this talk

Year after year, the Verizon Data Breach Report highlights the fact that compromised credentials contribute to the majority of security breaches. To prevent use of stolen passwords, organizations typically deploy multi-factor authentication (MFA). But not all MFA options offer the same level of assurance for identity verification. Cisco Duo’s vision is to provide strong authentication and simplify secure access for organizations of all sizes. As an active member of organizations such as Fast IDentity Online (FIDO) Alliance and World Wide Web Consortium (W3C), Duo Security has contributed to creating strong authentication standards which has enabled us to seamlessly support MFA factors such as FIDO2/WebAuthn. And now, we are thrilled to bring our FIDO2-based passwordless authentication solution to all paying customers in the coming months. Join Cisco Duo Product Marketing Manager, Ganesh Umapathy and Sales Engineer, Eddie Caballero, for an engaging session on how you can improve phishing resistance and increase adoption of passwordless authentication in your organization.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (81)
Subscribers (17182)
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.