Cisco Duo Features
Authentication Options (6)
Authentication User experience
As reported in 97 Cisco Duo reviews.
Process of providing credentials and logging into multiple systems is easy and intuitive for users
Supports Required Authentication systems
As reported in 94 Cisco Duo reviews.
Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
Multi-Factor Authentication
This feature was mentioned in 97 Cisco Duo reviews.
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Supports Required Authentication Methods/Protocols
87 reviewers of Cisco Duo have provided feedback on this feature.
Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
Federation/SAML support (idp)
66 reviewers of Cisco Duo have provided feedback on this feature.
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
Federation/SAML support (sp)
65 reviewers of Cisco Duo have provided feedback on this feature.
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
Access Control Types (5)
Endpoint access
Based on 81 Cisco Duo reviews.
Provides ability to control access to PC's, Mobile devices, and other endpoint devices.
Local Access
This feature was mentioned in 84 Cisco Duo reviews.
Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.
Remote Access
89 reviewers of Cisco Duo have provided feedback on this feature.
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
Partner Access
Based on 69 Cisco Duo reviews.
Controls access to users that are not company employees that are either within the companies local area network or outside the network
Supports BYOD users
Based on 72 Cisco Duo reviews.
Enables users to use their own device to access company applications.
Administration (18)
Ease of installation on server
Based on 77 Cisco Duo reviews.
Installation process is easy and flexible.
Password Policy Enforcement
This feature was mentioned in 76 Cisco Duo reviews.
Options for resetting and enforcing password policies
Administration Console
As reported in 74 Cisco Duo reviews.
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Ease of connecting applications
As reported in 77 Cisco Duo reviews.
Easily provisions new systems, platforms or applications using configuration and not customization.
Self Service Password Administration
As reported in 76 Cisco Duo reviews.
Users can set, change passwords without interaction from IT staff
Auditing
This feature was mentioned in 29 Cisco Duo reviews.
Documents access and alterations of the database for analytics and reporting.
Data Discovery
This feature was mentioned in 28 Cisco Duo reviews.
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Based on 30 Cisco Duo reviews.
Supports LDAP Protocol to enable access control and governance.
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Bi-Directional Identity Synchronization
This feature was mentioned in 18 Cisco Duo reviews.
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Based on 21 Cisco Duo reviews.
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
As reported in 19 Cisco Duo reviews.
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Reporting and Monitoring
As reported in 15 Cisco Duo reviews.
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
14 reviewers of Cisco Duo have provided feedback on this feature.
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
As reported in 14 Cisco Duo reviews.
Documents access and alterations of the database for analytics and reporting.
Platform (7)
Multiple Operating system support
83 reviewers of Cisco Duo have provided feedback on this feature.
Supports Endpoint access control to multiple operating systems
Multi-Domain Support
This feature was mentioned in 78 Cisco Duo reviews.
Allows user authentication to be honored by all the hosts in two or more domains
Cross Browser support
This feature was mentioned in 79 Cisco Duo reviews.
Support access to browser based applications across required browser types
Fail over protection
As reported in 68 Cisco Duo reviews.
Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Reporting
This feature was mentioned in 69 Cisco Duo reviews.
Contains pre-built and custom reporting tools to required to manage business
Auditing
66 reviewers of Cisco Duo have provided feedback on this feature.
Provides mechanism for auditing authentication for trouble shooting purposes.
Third Party Web Services support
This feature was mentioned in 70 Cisco Duo reviews.
Can call and pass credentials to third party web services.
Authentication type (8)
SMS-Based
Based on 143 Cisco Duo reviews and verified by the G2 Product R&D team.
Sends a one-time passcode (OTP) via SMS.
Voice-Based Telephony
Based on 126 Cisco Duo reviews and verified by the G2 Product R&D team.
Provides a one-time passcode (OTP) via voice-call.
Email-Based
119 reviewers of Cisco Duo have provided feedback on this feature.
Sends a one-time passcode (OTP) via email.
Hardware Token-Based
Based on 121 Cisco Duo reviews and verified by the G2 Product R&D team.
Supports hardware tokens, which are often USB-sized, fob-like devices that store codes.
Software Token
Based on 137 Cisco Duo reviews and verified by the G2 Product R&D team.
Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline.
Biometric Factor
Based on 120 Cisco Duo reviews and verified by the G2 Product R&D team.
Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.
Mobile-Push
Based on 156 Cisco Duo reviews and verified by the G2 Product R&D team.
Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Risk-Based Authentication
Based on 120 Cisco Duo reviews and verified by the G2 Product R&D team.
Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.
Functionality (12)
Multi-Device Sync
Based on 130 Cisco Duo reviews and verified by the G2 Product R&D team.
Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this.
Backup
As reported in 118 Cisco Duo reviews.
Offers encrypted backup recovery stored by the vendor.
FIDO2-compliant
34 reviewers of Cisco Duo have provided feedback on this feature.
Offers FIDO2-enabled authentication method
Works with hardware security keys
This feature was mentioned in 34 Cisco Duo reviews.
Works with hardware security keys
Multiple authentication methods
Based on 41 Cisco Duo reviews.
Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others.
Offline or no-phone solution
As reported in 38 Cisco Duo reviews.
Offers solutions when users are offline or do not have access to a mobile phone.
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
As reported in 10 Cisco Duo reviews.
Offers password management tools to end users.
Single Sign-on
Based on 11 Cisco Duo reviews.
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
As reported in 10 Cisco Duo reviews.
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Based on 12 Cisco Duo reviews.
Authenticates users prior to granting access to company systems.
Multi-factor authentication
14 reviewers of Cisco Duo have provided feedback on this feature.
Offers multi-factor authentication methods to verify a user's identity.
Network Management (4)
Network Segmentation
Based on 22 Cisco Duo reviews.
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
24 reviewers of Cisco Duo have provided feedback on this feature.
Allows visual display of networks segmented components and their connected resources.
Security Analytics
This feature was mentioned in 24 Cisco Duo reviews.
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
This feature was mentioned in 34 Cisco Duo reviews.
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (8)
Security Automation
As reported in 24 Cisco Duo reviews.
Allows administrative control over automated security tasks.
Application Security
34 reviewers of Cisco Duo have provided feedback on this feature.
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
23 reviewers of Cisco Duo have provided feedback on this feature.
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
26 reviewers of Cisco Duo have provided feedback on this feature.
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Encrypted Storage
This feature was mentioned in 13 Cisco Duo reviews.
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
This feature was mentioned in 13 Cisco Duo reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
Based on 13 Cisco Duo reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
This feature was mentioned in 14 Cisco Duo reviews.
Allows administrators to set policies for security and data governance.
Identity Management (3)
Adaptive Access Control
Based on 24 Cisco Duo reviews.
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
24 reviewers of Cisco Duo have provided feedback on this feature.
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
25 reviewers of Cisco Duo have provided feedback on this feature.
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Data Protection (5)
Data Masking
Based on 29 Cisco Duo reviews.
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
As reported in 34 Cisco Duo reviews.
Manages policies for user data access and data encryption.
Data loss Prevention
Based on 32 Cisco Duo reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
30 reviewers of Cisco Duo have provided feedback on this feature.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
As reported in 33 Cisco Duo reviews.
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
Cloud Gap Analytics
31 reviewers of Cisco Duo have provided feedback on this feature.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
As reported in 31 Cisco Duo reviews.
Monitors data quality and send alerts based on violations or misuse.
User Analytics
As reported in 31 Cisco Duo reviews.
Allows for reporting and documentation of individual user behavior and privileges.
Integration (4)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Workforce Authentication
Integrates with identity and access management (IAM) solutions to manage workforce authentication.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Access Control (4)
User, Role, and Access Management
This feature was mentioned in 15 Cisco Duo reviews.
Allows administrators to provision access based on the individual user and their role.
Access Rights
15 reviewers of Cisco Duo have provided feedback on this feature.
Defines which users have access to the different modules of the software and how.
User Analytics
This feature was mentioned in 14 Cisco Duo reviews.
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
This feature was mentioned in 14 Cisco Duo reviews.
Monitors data quality and send alerts based on violations or misuse.
Type (2)
On-premises solution
Provides an IAM solution for on-prem systems.
Cloud-solution
As reported in 10 Cisco Duo reviews.
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Tracks user activities across protected systems.
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Implementation (3)
Easy Setup
Based on 153 Cisco Duo reviews and verified by the G2 Product R&D team.
Offers an easy to understand user interface to make setup smooth.
Mobile SDK
116 reviewers of Cisco Duo have provided feedback on this feature.
Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.
Web SDK
Based on 113 Cisco Duo reviews.
Offers a software development kit (SDK) for web-based applications.
Generative AI (2)
AI Text Summarization
This feature was mentioned in 12 Cisco Duo reviews.
Condenses long documents or text into a brief summary.
AI Text Generation
Based on 12 Cisco Duo reviews.
Allows users to generate text based on a text prompt.
Identity and Access Management - Zero Trust Platforms (4)
Single sign-on (SSO)
Simplifies user authentication across multiple services while maintaining security.
Multi-factor authentication (MFA)
Ensures that users are verified through multiple credentials before access is granted, reducing the risk of compromised accounts.
Role-based access control (RBAC)
Grants access based on the user’s role within the organization, adhering to the principle of least privilege.
Identity federation
Integrates with external identity providers to manage user identities across different platforms and services.
Security - Zero Trust Platforms (5)
Encryption
Mandatory encryption of data both at rest and in transit protects against unauthorized access.
Endpoint detection and response (EDR)
Continuous monitoring and real-time response capabilities with EDR help detect and mitigate threats on endpoint devices.
Device posture assessment
Verifies the security status of a device before granting access to network resources, ensuring that only compliant devices can connect.
Micro-segmentation
Divides the network into isolated segments to prevent lateral movement by attackers, ensuring that if one segment is compromised, others remain secure.
Zero trust network access (ZTNA)
Replaces traditional VPNs by enforcing granular, context-aware access to applications based on user identity, device, and other factors.
Data Security - Zero Trust Platforms (2)
Data loss prevention (DLP)
Detect and prevent unauthorized access or transfer of sensitive data.
Data classification
Data classification automatically categorizes data based on its sensitivity, allowing for appropriate security measures to be applied
Application Visibility - Zero Trust Platforms (5)
API support
API support ensures that the zero trust platform can integrate seamlessly with other security tools and existing infrastructure
Application-level controls
Provides the ability to enforce security policies at the application layer, ensuring that access to specific applications is tightly controlled.
Secure application access
ensures that only authorized users can access critical applications, protecting against unauthorized entry points
User and entity behavior analytics (UEBA)
UEBA identifies unusual behavior that may indicate a security threat, enabling proactive threat managemen
Continuous monitoring
Provides real-time visibility into all network traffic, user activities, and data flows to detect anomalies
Reporting and Policies - Zero Trust Platforms (5)
Policy automation
allows for automatic application of security policies based on predefined criteria, reducing the risk of human error and ensuring consistent enforcement
Regulatory compliance
Regulatory compliance assists organizations in adhering to industry-specific regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), or the California Consumer Privacy Act (CCPA)
Cross-platform compatibility
This works across different environments, including on-premises, cloud, and hybrid setups, ensuring comprehensive security coverage
Policy enforcement
This ensures that security policies are consistently applied across all users, devices, and application
Comprehensive reporting
Detailed reports that provide insights into security events help organizations maintain compliance and optimize their security posture
Agentic AI - Zero Trust Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.





