Average Ratings 1,325 Ratings
Average Ratings 0 Ratings
Description
Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
Description
Safeguard against account takeovers, fraudulent new accounts, and multifactor authentication fatigue with the capabilities of PingOne Protect. This solution assesses various attack vectors, assigns risk ratings, and offers valuable insights, enabling the activation of mitigation tools that thwart potential threats while ensuring that genuine users can authenticate without difficulty. By leveraging intelligence-driven policies, PingOne Protect amalgamates the outcomes of diverse risk indicators to derive a comprehensive risk score. This score is linked to specific policies that dictate the level of friction applied during user interactions, which may include techniques like CAPTCHA, password resets, selfie verifications, and push notifications. Enhance the effectiveness of each predictor, consolidate the predictors, integrate signals from external sources, and implement overrides as necessary. The predictors encompass bot detection, IP velocity, user velocity, anomalous velocity, user location discrepancies, IP reputation, usage of anonymous networks, risk behaviors of users, models of user-based risk, detection of new devices, identification of suspicious devices, and custom or third-party predictors, thereby providing a robust solution to manage risks effectively. By utilizing these comprehensive measures, organizations can significantly bolster their defenses against various forms of cyber threats.
API Access
Has API
API Access
Has API
Integrations
Abstract Security
Avatier Identity Anywhere
ClinicSoftware.com
Expel
Google Digital Risk Protection
IDmelon Authenticator
JupiterOne
Meraki Systems Manager
Play Digital Signage
Psono
Integrations
Abstract Security
Avatier Identity Anywhere
ClinicSoftware.com
Expel
Google Digital Risk Protection
IDmelon Authenticator
JupiterOne
Meraki Systems Manager
Play Digital Signage
Psono
Pricing Details
$3 per user per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cisco
Founded
2010
Country
United States
Website
duo.com
Vendor Details
Company Name
Ping Identity
Founded
2002
Country
United States
Website
www.pingidentity.com/en/platform/capabilities/threat-protection/pingone-protect.html
Product Features
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Customer Identity and Access Management (CIAM)
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Password Management
Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management
Self-Service Password Reset (SSPR)
Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)
Single Sign On
Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service
Product Features
Fraud Detection
Access Security Management
Check Fraud Monitoring
Custom Fraud Parameters
For Banking
For Crypto
For Insurance Industry
For eCommerce
Internal Fraud Monitoring
Investigator Notes
Pattern Recognition
Transaction Approval