Compare Cisco Duo and Zscaler Zero Trust Cloud

At a Glance
Cisco Duo
Cisco Duo
Star Rating
(495)4.5 out of 5
Market Segments
Enterprise (43.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 4 pricing plans
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Star Rating
(42)4.6 out of 5
Market Segments
Enterprise (48.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Zero Trust Cloud
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Cisco Duo excels in user experience, particularly with its seamless integration across devices. Users appreciate how it simplifies authentication, allowing them to access multiple solutions without repeated logins, enhancing overall convenience.
  • Users say that Zscaler Zero Trust Cloud stands out for its comprehensive security features, including advanced integrations with cloud posture management and robust threat protection. This makes it a strong choice for organizations looking for a complete Zero Trust solution.
  • Reviewers mention that Cisco Duo's implementation process is quick and intuitive, with many highlighting the ease of setup as a significant advantage. This is particularly beneficial for teams that need to get up and running without extensive training.
  • According to verified reviews, Zscaler Zero Trust Cloud is praised for its user-friendly interface and solid performance, making it easy to manage and navigate. Users find it straightforward to implement and appreciate its efficiency in handling traffic.
  • G2 reviewers highlight that while both products receive high marks for support quality, Cisco Duo has a slight edge in being a reliable partner for businesses, with users noting their satisfaction with the support they receive during implementation and ongoing use.
  • Users report that Cisco Duo's focus on two-factor authentication (2FA) enhances security confidence, with many feeling more secure during sign-ins. In contrast, while Zscaler offers strong security features, some users feel it may not be as focused on individual authentication experiences.
Pricing
Entry-Level Pricing
Cisco Duo
Duo Free
Free
Browse all 4 pricing plans
Zscaler Zero Trust Cloud
No pricing available
Free Trial
Cisco Duo
Free Trial is available
Zscaler Zero Trust Cloud
No trial information available
Ratings
Meets Requirements
9.4
387
8.9
32
Ease of Use
9.3
392
8.6
32
Ease of Setup
9.0
150
8.6
20
Ease of Admin
9.3
93
8.4
19
Quality of Support
8.9
296
8.9
29
Has the product been a good partner in doing business?
9.2
91
8.6
19
Product Direction (% positive)
8.5
375
8.9
31
Features by Category
9.3
113
Not enough data
Authentication Options
9.3
98
Not enough data
9.3
95
Not enough data
9.6
98
Not enough data
9.4
88
Not enough data
9.1
67
Not enough data
9.4
66
Not enough data
Access Control Types
9.6
82
Not enough data
9.3
84
Not enough data
9.5
90
Not enough data
9.1
69
Not enough data
9.2
73
Not enough data
Administration
9.1
78
Not enough data
9.4
77
Not enough data
9.3
75
Not enough data
9.3
78
Not enough data
9.0
77
Not enough data
Platform
9.4
84
Not enough data
9.5
79
Not enough data
9.4
79
Not enough data
9.1
68
Not enough data
9.1
70
Not enough data
9.0
67
Not enough data
9.1
70
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
8.5
185
Not enough data
Authentication type
8.4
144
|
Verified
Not enough data
7.8
126
|
Verified
Not enough data
8.0
120
Not enough data
8.2
122
|
Verified
Not enough data
8.8
138
|
Verified
Not enough data
8.3
121
|
Verified
Not enough data
9.3
156
|
Verified
Not enough data
8.6
120
|
Verified
Not enough data
Functionality
8.8
130
|
Verified
Not enough data
8.1
118
Not enough data
Implementation
9.0
153
|
Verified
Not enough data
8.5
116
Not enough data
8.2
113
Not enough data
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Controls
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.5
45
Not enough data
Network Management
8.6
22
Not enough data
8.5
24
Not enough data
8.7
24
Not enough data
8.8
34
Not enough data
Security
9.0
24
Not enough data
9.4
35
Not enough data
8.6
23
Not enough data
9.2
26
Not enough data
Identity Management
8.8
24
Not enough data
8.5
24
Not enough data
8.7
25
Not enough data
Generative AI
6.9
12
Not enough data
7.1
12
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
12
Analysis
Not enough data
9.1
11
Not enough data
8.8
11
Not enough data
8.5
11
Functionality
Not enough data
8.6
11
Not enough data
9.2
11
Not enough data
9.1
11
Security
Not enough data
9.0
10
Not enough data
8.6
11
Not enough data
8.8
11
Not enough data
8.9
11
8.9
38
8.9
17
Data Protection
8.9
29
8.8
14
9.1
34
8.9
14
9.0
32
9.0
13
8.7
30
8.5
13
9.4
33
9.1
13
Analysis
8.5
31
9.2
12
8.8
31
9.0
13
8.9
31
8.8
13
Administration
8.8
29
8.8
13
8.4
28
9.0
13
8.9
30
9.1
13
Biometric AuthenticationHide 7 FeaturesShow 7 Features
8.9
7
Not enough data
Integration
8.9
6
Not enough data
8.1
6
Not enough data
9.0
7
Not enough data
8.8
7
Not enough data
Administration
9.3
7
Not enough data
8.9
6
Not enough data
9.2
6
Not enough data
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
9.2
24
Not enough data
Administration
9.4
18
Not enough data
9.1
21
Not enough data
9.1
19
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Agentic AI - Cloud Migration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.2
17
Not enough data
Security
9.4
13
Not enough data
9.0
13
Not enough data
9.1
13
Not enough data
9.3
14
Not enough data
Administration
9.6
15
Not enough data
9.0
14
Not enough data
9.3
14
Not enough data
Access Control
9.7
15
Not enough data
9.1
15
Not enough data
9.2
14
Not enough data
9.0
14
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
8.8
43
Not enough data
Functionality
9.0
34
Not enough data
8.8
34
Not enough data
9.2
41
Not enough data
8.0
38
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.0
17
Not enough data
Functionality
9.6
8
Not enough data
8.3
10
Not enough data
8.9
11
Not enough data
8.7
10
Not enough data
9.7
13
Not enough data
10.0
15
Not enough data
Type
8.7
10
Not enough data
8.2
10
Not enough data
Reporting
9.1
9
Not enough data
8.7
9
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.5
6
Management
Not enough data
8.3
5
Not enough data
8.3
5
Not enough data
8.7
5
Not enough data
8.3
5
Monitoring
Not enough data
8.7
5
Not enough data
8.7
5
Not enough data
8.7
5
Protection
Not enough data
Not enough data
Not enough data
8.3
5
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enforcement
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.7
6
Not enough data
Identity and Access Management - Zero Trust Platforms
9.7
5
Not enough data
10.0
5
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Cisco Duo
Cisco Duo
Small-Business(50 or fewer emp.)
18.2%
Mid-Market(51-1000 emp.)
37.9%
Enterprise(> 1000 emp.)
43.9%
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Small-Business(50 or fewer emp.)
29.7%
Mid-Market(51-1000 emp.)
21.6%
Enterprise(> 1000 emp.)
48.6%
Reviewers' Industry
Cisco Duo
Cisco Duo
Information Technology and Services
16.9%
Higher Education
12.3%
Computer Software
5.7%
Hospital & Health Care
5.3%
Education Management
4.6%
Other
55.2%
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud
Information Technology and Services
27.0%
Computer & Network Security
18.9%
Airlines/Aviation
5.4%
Biotechnology
5.4%
Alternative Medicine
2.7%
Other
40.5%
Alternatives
Cisco Duo
Cisco Duo Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
LastPass
LastPass
Add LastPass
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
OneLogin
OneLogin
Add OneLogin
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud Alternatives
HubSpot Data Hub
HubSpot Data Hub
Add HubSpot Data Hub
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Check Point Harmony Email & Collaboration
Check Point Harmony Email &...
Add Check Point Harmony Email & Collaboration
Discussions
Cisco Duo
Cisco Duo Discussions
Is Duo Security free?
3 Comments
VP
No it is not free you will need subscription.Read more
What is Duo Security used for?
3 Comments
Shyam Ji P.
SP
Comment deleted by user.Read more
What is duo security software?
2 Comments
Pradum K.
PK
It is mostly used for Two factor authentication service for various social media platform and for sso login to the same.Read more
Zscaler Zero Trust Cloud
Zscaler Zero Trust Cloud Discussions
What cloud does zscaler use?
1 Comment
PRAVEEN P.
PP
Zscaler having their own data centers over than 150+ data centers across all regions. For seamless SaaS application connectivity they having closest data...Read more
What is unique about zscaler?
1 Comment
PRAVEEN P.
PP
100% SSL Inspection for all TCP, UDP and ICMP Protocols with full scalability, that having no limitation or restrictions like appliance or VM based proxy or...Read more
Monty the Mongoose crying
Zscaler Zero Trust Cloud has no more discussions with answers