Menu

TechValidate Research on Duo Security

These pages present data that TechValidate has sourced via direct research with verified customers and users of Duo Security. TechValidate stands behind the authenticity of all published data. Learn more »



4,475 Customers Surveyed

37,672 Data Points Collected

601 Published TechFacts

15 Published Charts

60 Published Case Studies



Selected Research Highlights


Duo Security Customer Testimonial

Duo has significantly raised our security posture while adding little user frustration.

Randy Bock, IT Manager, Central Electric Power Cooperative

Duo Security Case Study

Brigham Young University

Introduction

This case study of Brigham Young University is based on a July 2016 survey of Duo Security customers by TechValidate, a 3rd-party research service.

“I believe using Duo has gone a long way at preventing phishing attempts. Duo protects my organization from data breaches even in the event of a successful phishing attack against our employees.”

Challenges

Deployed a multi-factor solution at their organization because of the following reasons:

  • A previous breach or leak led to the need for further security measures
  • It’s part of their company-wide security strategy
  • They heard in the media about multi-factor as a potential solution for data breaches
  • It added layer of security to protect against user-target attacks (such as phishing and social engineering)

Use Case

Is focused on addressing the following key threats in the next two years:

  • User-targeted attacks/phishing
  • Remote exploitation

Results

The surveyed organization achieved the following results with Duo Security:

  • Chose Duo over other competitors because of the following reasons:
    • Of overall costs-overhead
    • Of its integrations

Protects Against Phishing

We receive a large number of phishing campaigns and 2FA prevents compromised accounts from accessing core business systems.

System Administrator, Educational Institution

74% of Customers Allow Corporate Access through Personal Computers

From which end user devices can your employees access your corporate or cloud applications?

Employees' personal computers
74%
Employees' personal smartphones
70%
Employees' personal tablets
62%
Company administered tablets
51%
Company administered personal computers
90%
Company administered smartphones
61%
Other
3%

Duo Security Case Study

Digital Management, Inc.

Introduction

This case study of DMI is based on a July 2016 survey of Duo Security customers by TechValidate, a 3rd-party research service.

“Implementing Duo Security was the biggest bang-for-buck increase to our organization’s security posture in dealing with our actual threats.”

Challenges

  • Deployed a multi-factor solution at their organization because of the following reason:
    • A previous breach or leak led to the need for further security measures
  • Finds the following to be most concerning about personal mobile devices in the workplace:
    • Having limited or no visibility into the security health of employee devices

Use Case

  • Is focused on addressing the following key threats in the next two years:
    • User-targeted attacks/phishing
    • Remote exploitation

Results

The surveyed company achieved the following results with Duo Security:

  • Chose Duo over other competitors because of the following reasons:
    • Overall costs-overhead
    • Confidence/trust
    • Ease of use
    • User experience
    • Excellent documentation and knowledge base
    • Its out-of-box integrations
    • It’s cloud-based
    • Trust in security expertise of Dug Song, CEO, and Jon Oberheide, CTO, cofounders

Educational Institutions Fight Phishing with Duo

What were the top challenges you were trying to solve for when deploying a two-factor solution at your organization?

Phishing attacks have become more prevalent in the past year
65%
Regulatory compliance
46%
Previous breach led to need for further security measures
30%
Students, staff, faculty, and parents were requesting security measures that would protect their HR and other data
20%
Heard in the media about two-factor authentication as a potential solution for data breaches
19%


More to Explore



About Duo Security

Quickly deploy 2 factor authentication with Duo’s full suite of security services and protect every account with ease.

Duo Security Website   Duo Security Website