Device Trust Insights | Duo Security Skip navigation

Security Starts With Transparency

Duo’s device trust capabilities provide data on who’s accessing which company applications, and under what conditions — without requiring any agents on your users’ devices.

Get the free guide

image of a computer screen with a question mark, mobile device with a check mark and a laptop with an x on it representing device security

Verify Trustworthiness of Every Device

Duo's device trust features give you full visibility into the attributes and behaviors of the devices that access your applications. 

 Duo’s Device Insight inventories every user endpoint and provides data on operating system, platform, browser and plugin versions, including passcode, screen lock, full disk encryption and rooted/jailbroken status. Easily search, filter and export a list of devices by OS, browser and plugin, and refine searches to find out who’s susceptible to the latest iOS or Android vulnerability. 

 Duo Trust Monitor takes trust a step further by continuously analyzing authentication data, so that you can spot anomalous logins due to changes in device health, security policies, and user behavior.

image of a person checking their device security using Duo MFA authentication

Identify Risky Devices and Behavior

Even a trusted user may be using a device with out-of-date software, leaving them susceptible to vulnerabilities. Duo can automatically flag out-of-date devices and continuously monitor logins from any and every endpoint, saving your administrators upkeep time and resources better spent on your core business objectives.

Mitigate Vulnerabilities From At-Risk Software

Adobe Flash and Oracle Java have over 500 known vulnerabilities, putting your users’ devices and the company at risk of a data breach.

Duo gives you insight into software use across your organization, so you can see which users and devices run outdated versions of Flash, Java, and more.

Two images of Duo providing insight into software use across an organization and providing users with knowledge of devices that run outdated versions of Flash, Java and other apps
Image of Duo Device Insight dashboard showing a breakdown of the trusted (has a Duo certificate) and untrusted (does not have a Duo certificate) endpoints on your network.

Differentiate Managed and Unmanaged Devices

Secure your BYOD environment by differentiating between company and employee-owned devices that access your applications. 

It’s easy to deploy the Duo certificate on your company-issued laptops to mark them as ‘Trusted.’ After that, your Device Insight dashboard will automatically show a breakdown of the trusted (has a Duo certificate) and untrusted (does not have a Duo certificate) endpoints on your network.

Set Device Access Policies

To prevent the spread of malware and stop risky devices from accessing your applications, create custom access policies and controls based on security health profiles or anomalous access events. Duo’s Endpoint Remediation allows you to block access based on certain device factors. Closing security gaps starts with keeping devices patched and healthy.

For example, you can block any devices running out-of-date Flash or Java until the user updates their device to the latest software version. That way, you can ensure enterprise applications are protected against all known and reported vulnerabilities.

Image of a duo dashboard showing some policies and plugins the admin will have to manage