Duo Passwordless: Expert Tips and Your Questions Answered!

Logo
Presented by

Chris Demundo, Product Manager, Ted Kietzman, Product Marketing Manager

About this talk

After nine months of hard work, Duo’s new Passwordless solution is now in public preview using our Duo Single Sign-On solution, and we couldn’t be more thrilled. Built with a core focus of making it as easy as possible to adopt into your organization, we’ve developed the new passwordless product to work for any user, on any device; to integrate with your existing infrastructure; and to minimize setup time for both admins and end users alike. But how does it really work? And what does the new setup look like? And why did we start with an SSO integration? And what about legacy use cases? If these questions are swirling around in your head, followed by a hundred more, this webinar is for you. Please join us for a very special session led by Duo Product Manager Chris Demundo and Product Marketing Manager Ted Kietzman, where we’ll cover everything you need to know to start your passwordless journey. They will share insights into this new solution, including why you would use it, how secure it is, what the benefits are, best practices for using it, technical requirements, and so much more.
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (86)
Subscribers (17408)
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.