PRIV Security: How BlackBerry PRIV Safeguards Your Data
Duo Platform Edition Overview
1. Duo PlatformThe easiest way to effectively secure access.
SSH RDPVPN
Cloud Apps
IT Admin
Define Policies
Secure Access
View Device Health
Deny Rooted Devices
Block Bad Networks
Chelsea
foo
Bad IP Address
Blocked Location
Herschel
Unknown Network
Peter
COMPLETE VISIBILITY AND CONTROL STARTS HERE
“95% of web app attackers
used stolen credentials.”
—2015 Data Breach Report, Verizon
Smart security starts with smart access
control. Gain visibility and enforce practical
controls for all the users and devices
accessing your organization’s applications—
no matter where they’re located—in the
cloud or in your data center.
POLICY FRAMEWORK
Define rules for users, devices,
networks, and applications.
Create and enforce rules on who can
access what applications — under
what conditions. Define access policies
by user group and per application to
increase security without compromising
end user experience.
DUO ACCESS GATEWAY
Improve security and usability for
end users accessing cloud apps.
With Duo Access Gateway, you
can provide secure access to cloud
applications using your existing primary
credentials, such as usernames and
passwords in Microsoft Active Directory.
Protect access to cloud through
standards such as SAML. Think of it as
your secure bridge to the cloud.
DEVICE INSIGHT
Gain visibility into mobile devices
without installing MDM agents.
Measure your organization’s endpoint
security health by gathering data about
your users’ mobile and PC devices,
including OS and browser versions,
jailbroken/rooted status, and more.
Identify and restrict any noncompliant
devices to tighten your security profile.
SET A GEOLOCATION POLICY
Block users from China from
accessing your apps.
DENY LOGINS FROM TOR
NETWORKS
Prevent access from untrusted
or anonymous networks.
MONITOR DEVICE HEALTH
Identify jailbroken or rooted
devices in your environment.
VIEW REAL-TIME DEVICE
INSIGHT REPORTS
Inventory devices without
installing MDM agents.
Better security, not just more duosecurity.com/platform
2. Two-Factor
Authentication
Made Easy
Evaluation to solution —
in just minutes.
Our patented technology and drop-in
integrations enable you to seamlessly
integrate Duo into your existing login
workflow.
Secure users easily with rapid user
provisioning via Active Directory
synchronization and bulk user imports
via .csv files.
For smaller deployments, users can
simply provision themselves using our
simple self-enrollment feature.
Low-overhead. Low-
maintenance. High-value.
Users can bring their own devices, which
means no hardware investment for you.
Our multi-tenant cloud architecture lets
you quickly scale from one to millions
of users, with no additional hardware or
user training.
Advanced administrator controls allow
for complete visibility, while diverse
authentication options streamline the
end-user experience — all without
sacrificing security.
Frustrate the bad guys, not
your users.
Authenticating with Duo Push is as easy
as tapping a button on your phone. No
phone calls to wait for or passcodes to
type — saving users time and hassle
when they log in.
Multiple authentication methods ensure
your users have access they need,
when they need it — which means zero
complaints for you.
Users can manage their own devices
leveraging our new self-service portal.
Users can choose their authentication method at
each log in, providing the flexibility to:
Mobile App Cell Phone Landline Token No Cell Service Intl. Travel No WiFi
SUPPORT ALL DEVICES ADDRESS ALL LOGIN SCENARIOS
Trusted by more than 5,000 companies globally
Better security, not just more duosecurity.com