Menu

TechValidate Research on Duo Security

These pages present data that TechValidate has sourced via direct research with verified customers and users of Duo Security. TechValidate stands behind the authenticity of all published data. Learn more »



4,090 Customers Surveyed

34,903 Data Points Collected

601 Published TechFacts

15 Published Charts

60 Published Case Studies



Selected Research Highlights


Duo Security Customer Testimonial

Overall, our remote Team Members using our VPN services have a much more pleasant experience using Duo than our previous solution to authenticate. In addition, there are a number of Team Members who worried about a phishing attack. Since using Duo, they no longer worry so much.

IT Specialist, Large Enterprise Financial Services Company

72% of Organizations are Concerned about Vulnerable & Outdated OS on their Networks

Which of these potential risks is your primary concern when it comes to employee personal devices accessing your network?

Outdated operating system (OS)
72%
Flash
60%
Browser such as IE, Firefox, Chrome
60%
Java
59%
Other
11%

Ease of Two-Factor Authentication Implementation

The ease of implementation and variety of validation platforms makes Duo a good fit for most any operation. Passwords are not enough, two-factor is a must.

IT Specialist, Small Business Computer Services Company

Case Study: University of Tennessee, Knoxville

Introduction

This case study of University Of Tennessee, Knoxville is based on a April 2016 survey of Duo Security customers by TechValidate, a 3rd-party research service.

“We have used Duo Security for over three-years and have been very happy with the functionality. Our faculty and staff find Duo Security’s two-factor authentication platform to be easy and painless to use.”

“We have satisfied compliance requirements. Two-factor authentication mitigates (in some cases remediates) a number of our IT Risk Scenarios.”

Challenges

  • Solved for the following challenges when deploying a two-factor solution at their organization:
    • Regulatory compliance
    • Phishing attacks have become more prevalent in the past year
    • Students, staff, faculty, and parents were requesting security measures that would protect their HR and other data
  • Cites that their primary concerns are:
    • The loss of customer trust
    • Phishing attacks (which could lead to additional data access in our systems)
    • The damage of brand reputation
    • The costs of a breach (notification, credit monitoring, investigation, legal, etc.)

Use Case

  • Does not have visibility into all end-user/personal devices accessing their corporate network.
  • Employees access their corporate or cloud applications using:
    • Company administered personal computers
    • Company administered smartphones
    • Company administered tablets
    • Employees’ personal computers
    • Employees’ personal smartphones
    • Employees’ personal tablets
  • Has seen 10+ phishing attacks in their organization over the past year.

Results

  • Benefits seen from deploying Duo Security:
    • Is effective because it’s easy for IT to deploy and manage
    • Has saved them money compared to their previous solution
    • Is easier to use than their previous solution
    • Is easy to get up and running for someone just getting started with two-factor
    • Offers a wide variety of authentication methods for employees to log in, regardless of where they are or how they work

Case Study: Catchpoint Systems, Inc.

Introduction

This case study of Catchpoint Systems Inc is based on a February 2016 survey of Duo Security customers by TechValidate, a 3rd-party research service.

“Duo has enabled us to centrally manage the users who have access to our Production VPN and also helped us enforce two-factor authentication, all the while being amazingly easy to use.”

Challenges

  • On phishing attacks the company trains employees in the following way:
    • Not only trained employees on how to avoid phishing attacks but also holds routine trainings and outreach with our employees to communicate the impact of a successful phishing attack
  • Believes that the number of phishing attacks have increased over the past few years.

Use Case

  • Has seen 1-3 phishing attacks in their organization over the past year.
  • Most worried about the following applications being targeted and used for phishing:
    • Office 365
    • Sales
    • Marketing
    • Human Relations
  • Has the following tools available to their employees for helping them understand the dangers of phishing:
    • Regular classes / training sessions on good security practices
    • Occasional emails reminding employees to beware of phishing attempts

Results

  • Benefits seen from deploying Duo Security:
    • Effective because it’s easy for IT to deploy and manage
    • Effective because our employees love it and use it
    • Easier to use than their previous solution
    • Easy to get up and running for someone just getting started with two-factor
    • Offers a wide variety of authentication methods for employees to log in, regardless of where they are or how they work
  • Reduced the number of help requests by 26-50% since deploying Duo Security’s two-factor solution.

Healthcare Orgs Most Concerned about Loss of Patient Trust After a Breach

What is your primary concern in the event of a data breach?

Loss of patient trust: 30%
Costs of a breach (notification, credit monitoring, investigation, legal, etc): 25%
Damage of brand reputation: 19%
Phishing attacks could lead to additional data access in our systems: 13%
Other: 9%
Loss of customers: 4%


More to Explore



About Duo Security

Quickly deploy 2 factor authentication with Duo’s full suite of security services and protect every account with ease.

Duo Security Website   Duo Security Website