SlideShare a Scribd company logo
1 of 10
Duo Security
Alishah Chator - alishahc
Products
Two Factor Authentication
Multitudes of options
Open Source Libraries
Duo API edition
Security Culture
Financial Info
Currently private
Raised $30 million this year in Series C funding
Total funding at $48 million
300% percent increase from 2013 to 2014
400% percent from 2012 to 2013
Backed by Google Ventures, true ventures, Redpoint, Benchmark
History
Backstory
Founded in 2009 as Scio Security by Dug Song and Jon Oberheide
October 2012 - Moved out of tech brewery to new building in Kerrytown
September 2013 - Facebook adopts Duo for 2FA
December 2013 - Duo introduces editions
Q1 2015 - Duo moves to new downtown office
Whats Hot?
Duo Platform
Lots of analytics and more granular controls
detects vulnerable tools and offers solutions
Research
Blogging
Secret Sauce
Simplicity
Innovation
Dug
Story
User finds a vuln in PayPal app’s 2FA
PayPal does not acknowledge the case
User contacts Duo to investigate and pressure PayPal into fix
Duo sets disclosure date, PayPal tries to delay
Day before disclosure, Paypal introduces temporary fix
Competition
Predictions
Why they will succeed
Aggressive Growth
Simplicity but specificity
Security Top-Of_Mindness
Pitfalls
Turnover

More Related Content

Viewers also liked

Zynga company report
Zynga company reportZynga company report
Zynga company reportJared Slawski
 
FIFA Company Presentation
FIFA Company PresentationFIFA Company Presentation
FIFA Company Presentationnickorlando
 
Company report
Company reportCompany report
Company reportYuting Wu
 
Andreas hailu company_preso
Andreas hailu company_presoAndreas hailu company_preso
Andreas hailu company_presoAndreas Hailu
 
Google lu huang-submitversion
Google lu huang-submitversionGoogle lu huang-submitversion
Google lu huang-submitversionLu Huang
 
Ofo liuliang
Ofo liuliangOfo liuliang
Ofo liuliangLiang Liu
 
Lyft Company Presentation
Lyft Company PresentationLyft Company Presentation
Lyft Company PresentationTyler Laredo
 
Square Company Report - Diego
Square Company Report - DiegoSquare Company Report - Diego
Square Company Report - DiegoDiego Holt
 
Venmo Company Presentation
Venmo Company PresentationVenmo Company Presentation
Venmo Company PresentationMara Gordon
 
Alibaba Company Presentation
Alibaba Company PresentationAlibaba Company Presentation
Alibaba Company PresentationWilliam Zhang
 
Rokid-Kangxu Wang
Rokid-Kangxu WangRokid-Kangxu Wang
Rokid-Kangxu WangKangxu Wang
 

Viewers also liked (20)

Zynga company report
Zynga company reportZynga company report
Zynga company report
 
Fire Eye Inc.
Fire Eye Inc.Fire Eye Inc.
Fire Eye Inc.
 
Presentation
PresentationPresentation
Presentation
 
FIFA Company Presentation
FIFA Company PresentationFIFA Company Presentation
FIFA Company Presentation
 
Adidas Presentation
Adidas PresentationAdidas Presentation
Adidas Presentation
 
Indeed
IndeedIndeed
Indeed
 
Company report
Company reportCompany report
Company report
 
Andreas hailu company_preso
Andreas hailu company_presoAndreas hailu company_preso
Andreas hailu company_preso
 
Google lu huang-submitversion
Google lu huang-submitversionGoogle lu huang-submitversion
Google lu huang-submitversion
 
Xiaomi
XiaomiXiaomi
Xiaomi
 
Baba
BabaBaba
Baba
 
Square, Inc - an overview
Square, Inc - an overviewSquare, Inc - an overview
Square, Inc - an overview
 
Ofo liuliang
Ofo liuliangOfo liuliang
Ofo liuliang
 
Lyft Company Presentation
Lyft Company PresentationLyft Company Presentation
Lyft Company Presentation
 
Company preso
Company presoCompany preso
Company preso
 
Square Company Report - Diego
Square Company Report - DiegoSquare Company Report - Diego
Square Company Report - Diego
 
Venmo Company Presentation
Venmo Company PresentationVenmo Company Presentation
Venmo Company Presentation
 
Alibaba Company Presentation
Alibaba Company PresentationAlibaba Company Presentation
Alibaba Company Presentation
 
Rokid-Kangxu Wang
Rokid-Kangxu WangRokid-Kangxu Wang
Rokid-Kangxu Wang
 
Zty company report
Zty company reportZty company report
Zty company report
 

Similar to Duo Security Provides Strong Two-Factor Authentication and API Solutions While Maintaining a Focus on Simplicity and Innovation

How to Win in Tech M&A in 2014
How to Win in Tech M&A in 2014How to Win in Tech M&A in 2014
How to Win in Tech M&A in 2014Maurice Watkins
 
How to start? (and excel with the elephants)
How to start? (and excel with the elephants)How to start? (and excel with the elephants)
How to start? (and excel with the elephants)Ido Green
 
How to win in tech m&a v f
How to win in tech m&a v fHow to win in tech m&a v f
How to win in tech m&a v fMaurice Watkins
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
 
2013 csi interchange_pietro_leo - ex
2013 csi interchange_pietro_leo - ex2013 csi interchange_pietro_leo - ex
2013 csi interchange_pietro_leo - exPietro Leo
 
Team 2 io_t_adj0
Team 2 io_t_adj0Team 2 io_t_adj0
Team 2 io_t_adj0EVA
 
Case iidf -_komanda_2
Case iidf -_komanda_2Case iidf -_komanda_2
Case iidf -_komanda_2EVA
 
Case (iidf) team 2 (eng)
Case (iidf)   team 2 (eng)Case (iidf)   team 2 (eng)
Case (iidf) team 2 (eng)EVA
 
Your AI Transformation
Your AI Transformation Your AI Transformation
Your AI Transformation Sri Ambati
 
Building a developer community around hardware + software
Building a developer community around hardware + softwareBuilding a developer community around hardware + software
Building a developer community around hardware + softwareAmanda Whaley
 
AADHAR DATA LEAK OF 81.pptx
AADHAR DATA LEAK OF 81.pptxAADHAR DATA LEAK OF 81.pptx
AADHAR DATA LEAK OF 81.pptxmayankbisht1029
 
Outlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewIPG Media Lab
 
Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9
Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9
Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9Carmine Porco
 
What Does the Future of the Web Look Like?
What Does the Future of the Web Look Like?What Does the Future of the Web Look Like?
What Does the Future of the Web Look Like?Tinuiti
 
Tech data - Weech
Tech data - WeechTech data - Weech
Tech data - Weechsjweech
 
Brands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New EcosystemsBrands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New EcosystemsIPG Media Lab
 
Who needs spwyare when you have COVID-19 apps?
Who needs spwyare when you have COVID-19 apps?Who needs spwyare when you have COVID-19 apps?
Who needs spwyare when you have COVID-19 apps?Megan DeBlois
 
Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...
Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...
Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...Neo4j
 

Similar to Duo Security Provides Strong Two-Factor Authentication and API Solutions While Maintaining a Focus on Simplicity and Innovation (20)

How to Win in Tech M&A in 2014
How to Win in Tech M&A in 2014How to Win in Tech M&A in 2014
How to Win in Tech M&A in 2014
 
How to start? (and excel with the elephants)
How to start? (and excel with the elephants)How to start? (and excel with the elephants)
How to start? (and excel with the elephants)
 
Why it project fail
Why it project failWhy it project fail
Why it project fail
 
How to win in tech m&a v f
How to win in tech m&a v fHow to win in tech m&a v f
How to win in tech m&a v f
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
2013 csi interchange_pietro_leo - ex
2013 csi interchange_pietro_leo - ex2013 csi interchange_pietro_leo - ex
2013 csi interchange_pietro_leo - ex
 
Team 2 io_t_adj0
Team 2 io_t_adj0Team 2 io_t_adj0
Team 2 io_t_adj0
 
Case iidf -_komanda_2
Case iidf -_komanda_2Case iidf -_komanda_2
Case iidf -_komanda_2
 
Case (iidf) team 2 (eng)
Case (iidf)   team 2 (eng)Case (iidf)   team 2 (eng)
Case (iidf) team 2 (eng)
 
Your AI Transformation
Your AI Transformation Your AI Transformation
Your AI Transformation
 
Building a developer community around hardware + software
Building a developer community around hardware + softwareBuilding a developer community around hardware + software
Building a developer community around hardware + software
 
AADHAR DATA LEAK OF 81.pptx
AADHAR DATA LEAK OF 81.pptxAADHAR DATA LEAK OF 81.pptx
AADHAR DATA LEAK OF 81.pptx
 
Outlook 2014 Mid-Year Review
Outlook 2014 Mid-Year ReviewOutlook 2014 Mid-Year Review
Outlook 2014 Mid-Year Review
 
Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9
Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9
Promise Of Web 2.0 Inside The Firewall Fed Press Dec 9
 
What Does the Future of the Web Look Like?
What Does the Future of the Web Look Like?What Does the Future of the Web Look Like?
What Does the Future of the Web Look Like?
 
Tech data - Weech
Tech data - WeechTech data - Weech
Tech data - Weech
 
Brands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New EcosystemsBrands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New Ecosystems
 
Who needs spwyare when you have COVID-19 apps?
Who needs spwyare when you have COVID-19 apps?Who needs spwyare when you have COVID-19 apps?
Who needs spwyare when you have COVID-19 apps?
 
Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...
Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...
Google Cloud and Neo4j: Solving Industry Challenges with Graph Data Analytics...
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Duo Security Provides Strong Two-Factor Authentication and API Solutions While Maintaining a Focus on Simplicity and Innovation

Editor's Notes

  1. Authy vs Duo - similar features, more restrictive, more expensive RSA - pain to set up