Introducing G2.ai, the future of software buying.Try now

Compare Cisco Duo and Twingate

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Cisco Duo
Cisco Duo
Star Rating
(435)4.5 out of 5
Market Segments
Enterprise (44.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 4 pricing plans
Twingate
Twingate
Star Rating
(74)4.7 out of 5
Market Segments
Mid-Market (50.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $10.00 1 user, per month
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Cisco Duo excels in overall user satisfaction, reflected in its higher G2 Score of 71.91 compared to Twingate's 50.08. Users appreciate its robust security features, including multiple authentication options like push notifications and biometrics, which enhance peace of mind.
  • Users say that Cisco Duo's implementation process is straightforward, with many highlighting the ease of installation and integration with enterprise tools. This is a significant advantage for organizations looking to quickly secure their systems without extensive downtime.
  • Reviewers mention that Twingate shines in its admin experience, particularly for teams managing numerous resources. Users find it easy to create groups and manage policies, which streamlines operations and reduces administrative overhead.
  • According to verified reviews, Cisco Duo offers superior support quality, with users noting responsive assistance and effective centralized admin controls for policy enforcement. This level of support is crucial for enterprises that require reliable security management.
  • Users highlight that Twingate's ease of use is commendable, especially for teams migrating from more complex systems. The ability to manage users and resources through Terraform integration simplifies the process, making it a favorable choice for mid-market companies.
  • G2 reviewers indicate that while Cisco Duo has a broader market presence, Twingate's focus on mid-market solutions allows it to cater effectively to specific user needs. However, Cisco Duo's extensive feature set, including device health checks and security analytics, positions it as a more comprehensive solution for larger enterprises.
Pricing
Entry-Level Pricing
Cisco Duo
Duo Free
Free
Browse all 4 pricing plans
Twingate
Business
Starting at $10.00
1 user, per month
Browse all 3 pricing plans
Free Trial
Cisco Duo
Free Trial is available
Twingate
Free Trial is available
Ratings
Meets Requirements
9.4
347
9.1
51
Ease of Use
9.3
352
9.7
52
Ease of Setup
9.0
111
9.2
45
Ease of Admin
9.2
82
9.1
45
Quality of Support
8.9
263
9.1
46
Has the product been a good partner in doing business?
9.1
80
9.3
44
Product Direction (% positive)
8.4
335
9.0
49
Features by Category
9.3
104
Not enough data
Authentication Options
9.2
96
Not enough data
9.3
92
Not enough data
9.6
90
Not enough data
9.3
87
Not enough data
9.1
66
Not enough data
9.4
65
Not enough data
Access Control Types
9.6
81
Not enough data
9.3
84
Not enough data
9.5
87
Not enough data
9.1
69
Not enough data
9.2
72
Not enough data
Administration
9.1
76
Not enough data
9.3
76
Not enough data
9.2
73
Not enough data
9.3
76
Not enough data
9.0
76
Not enough data
Platform
9.4
83
Not enough data
9.5
78
Not enough data
9.4
79
Not enough data
9.1
68
Not enough data
9.0
68
Not enough data
9.0
65
Not enough data
9.1
70
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.4
158
Not enough data
Authentication type
8.3
136
|
Verified
Not enough data
7.7
123
|
Verified
Not enough data
7.9
117
Not enough data
8.1
117
|
Verified
Not enough data
8.7
125
|
Verified
Not enough data
8.2
116
|
Verified
Not enough data
9.3
143
|
Verified
Not enough data
8.6
117
|
Verified
Not enough data
Functionality
8.7
125
|
Verified
Not enough data
8.0
117
Not enough data
Implementation
9.0
142
|
Verified
Not enough data
8.5
115
Not enough data
8.2
112
Not enough data
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
Not enough data
8.9
16
Data
Not enough data
9.0
16
Not enough data
9.4
16
Not enough data
9.2
16
Network
Not enough data
9.3
15
Not enough data
9.1
15
Not enough data
8.8
13
Logistics
Not enough data
8.5
10
Not enough data
8.6
11
Not enough data
8.1
8
8.5
30
7.7
32
Network Management
8.6
22
9.0
29
8.5
23
8.3
24
8.7
24
8.5
19
8.7
23
8.0
19
Security
9.0
23
8.3
22
9.2
26
8.7
22
8.6
23
8.8
23
9.1
24
8.3
22
Identity Management
8.8
24
8.8
19
8.4
23
7.7
17
8.6
24
7.5
18
Generative AI
6.9
12
4.4
6
7.1
12
3.9
6
8.9
37
Not enough data
Data Protection
8.9
29
Not enough data
9.1
33
Not enough data
9.0
32
Not enough data
8.7
30
Not enough data
9.4
32
Not enough data
Analysis
8.5
31
Not enough data
8.8
31
Not enough data
8.9
31
Not enough data
Administration
8.8
29
Not enough data
8.4
28
Not enough data
8.9
30
Not enough data
Biometric AuthenticationHide 7 FeaturesShow 7 Features
8.8
6
Not enough data
Integration
8.9
6
Not enough data
8.1
6
Not enough data
8.9
6
Not enough data
8.6
6
Not enough data
Administration
9.2
6
Not enough data
8.9
6
Not enough data
9.2
6
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
9.2
24
Not enough data
Administration
9.4
18
Not enough data
9.1
21
Not enough data
9.1
19
Not enough data
Not enough data
Not enough data
9.2
17
Not enough data
Security
9.4
13
Not enough data
9.0
13
Not enough data
9.1
13
Not enough data
9.3
14
Not enough data
Administration
9.6
15
Not enough data
9.0
14
Not enough data
9.3
14
Not enough data
Access Control
9.7
15
Not enough data
9.1
15
Not enough data
9.2
14
Not enough data
9.0
14
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.8
40
Not enough data
Functionality
9.0
33
Not enough data
8.8
34
Not enough data
9.2
39
Not enough data
8.0
37
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
8.9
10
Not enough data
Functionality
9.6
8
Not enough data
8.3
9
Not enough data
8.7
9
Not enough data
8.7
9
Not enough data
9.6
8
Not enough data
10.0
9
Not enough data
Type
8.5
9
Not enough data
8.1
9
Not enough data
Reporting
9.1
9
Not enough data
8.7
9
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.7
18
Administration
Not enough data
9.0
14
Not enough data
9.0
12
Not enough data
8.9
14
Protection
Not enough data
9.1
11
Not enough data
8.6
11
Not enough data
9.4
13
Not enough data
9.6
14
Monitoring
Not enough data
8.1
12
Not enough data
Feature Not Available
Not enough data
7.9
11
Not enough data
7.8
12
Not enough data
8.5
11
Management
Not enough data
8.8
7
Not enough data
Feature Not Available
Not enough data
8.3
8
Not enough data
9.1
9
Monitoring
Not enough data
Feature Not Available
Not enough data
8.8
7
Not enough data
7.1
7
Protection
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.1
9
Not enough data
8.2
10
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.3
30
Usage
Not enough data
9.3
28
Not enough data
8.8
27
Not enough data
Feature Not Available
Not enough data
8.8
28
Not enough data
Feature Not Available
Not enough data
8.8
26
Not enough data
Feature Not Available
Miscellaneous
Not enough data
6.9
22
Not enough data
Feature Not Available
Not enough data
7.4
19
Reviews
Reviewers' Company Size
Cisco Duo
Cisco Duo
Small-Business(50 or fewer emp.)
18.1%
Mid-Market(51-1000 emp.)
37.1%
Enterprise(> 1000 emp.)
44.8%
Twingate
Twingate
Small-Business(50 or fewer emp.)
43.7%
Mid-Market(51-1000 emp.)
50.7%
Enterprise(> 1000 emp.)
5.6%
Reviewers' Industry
Cisco Duo
Cisco Duo
Information Technology and Services
16.6%
Higher Education
12.8%
Computer Software
5.8%
Hospital & Health Care
5.1%
Financial Services
4.8%
Other
54.9%
Twingate
Twingate
Information Technology and Services
18.3%
Computer Software
14.1%
Computer & Network Security
14.1%
Financial Services
11.3%
Marketing and Advertising
5.6%
Other
36.6%
Alternatives
Cisco Duo
Cisco Duo Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
LastPass
LastPass
Add LastPass
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
OneLogin
OneLogin
Add OneLogin
Twingate
Twingate Alternatives
Check Point Harmony SASE
Check Point Harmony SASE
Add Check Point Harmony SASE
Zscaler Private Access
Zscaler Private Access
Add Zscaler Private Access
NordLayer
NordLayer
Add NordLayer
Okta
Okta
Add Okta
Discussions
Cisco Duo
Cisco Duo Discussions
Is Duo Security free?
3 Comments
VP
No it is not free you will need subscription.Read more
What is duo security software?
2 Comments
Pradum K.
PK
It is mostly used for Two factor authentication service for various social media platform and for sso login to the same.Read more
What is a key feature of duo?
2 Comments
Mark Andrew G.
MG
Mobile authentication it is. No need for security key!Read more
Twingate
Twingate Discussions
Monty the Mongoose crying
Twingate has no discussions with answers
Cisco Duo
Cisco Duo
Optimized for quick response
Twingate
Twingate
Optimized for quick response