Duo Security Two Factor Evaluation Guide
Duo Security Two Factor Evaluation Guide
Duo Security Two Factor Evaluation Guide
Two-Factor Authentication
Evaluation Guide
What to look for when assessing and comparing
two-factor authentication solutions
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
Two-factor authentication
is the simplest, most effective
way to make sure users really
are who they say they are.
It protects your applications and data against unauthorized But, not every two-factor solution is the same. Some vendors
breaches protected only with a password. support – costing your employees time and productivity.
default or stolen ++ A
comprehensive set of criteria to customize your evaluation to your organization’s needs
passwords.
++ An overview of the hidden costs of a two‑factor solution and how to determine your return on investment (ROI)
++ What to look for to ensure your solution can protect against the risk of a data breach
1
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
2
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
Security Impact
The most critical security aspects of an authentication solution are 1) effectiveness against threats related to credential theft, and
2) underlying security and reliability. The primary goal is to reduce the risk of a data breach to your organization. If a solution is
easily bypassed or doesn’t provide comprehensive protection, it’s not worth implementing (at any cost!).
But by focusing only on the local network perimeter, these To protect against downtime, your provider’s service should
solutions leave many security gaps and zero coverage for be distributed across multiple geographic regions, providers
cloud applications. and power grids for seamless failover. Reliable vendors
should demonstrate 99.995% uptime, guaranteed by strong
service level agreements (SLA).
How can you be sure you’re getting the best security return on your investment? Consider:
Upfront Costs
See if your vendor’s purchasing model requires that you pay per
AUTHENTICATORS HIGH AVAILABILITY CONFIGURATION
device, user or integration – this is important if your company
Do you have to purchase dedicated end-user devices? While Is this also included in your software license? By setting
plans to add new applications or services in the future. Estimate
tokens can add up, a mobile authentication app is typically free up duplicate instances of your software and connecting
how much it will cost to deploy two-factor authentication to all
for any number of users. a load balancer with the primary instance, you can end
of your apps and users.
up tripling your software costs. Setting up a redundant or
DATA CENTER COSTS disaster recovery configuration can also increase costs
ADMINISTRATIVE SOFTWARE/HARDWARE
Do you have to purchase servers? Server hosting costs can significantly, and some vendors charge additional licenses for
Is this included in the software license? Additional
add up: power, HVAC (heating, cooling and air conditioning), business continuity.
management software is often required – without this,
physical security, personnel, etc. A cloud‑based vendor will
customers can’t deploy two factor.
cover those costs.
It’s often the responsibility of the customer to search for new Estimate how long it takes to complete routine administrative
END USER ENROLLMENT
patches from the vendor and apply them. Look for a vendor tasks – is it easy to add new users, revoke credentials or
Estimate how long it will take each user to enroll, and if it
that automatically updates the software for security and other replace tokens? Routine tasks, like managing users, should
requires any additional administrative training and helpdesk
critical updates, saving the cost of hiring a team. be simple – sign up for a trial and take it for a test run before
time. Look for an intuitive end user experience and simple
deploying it to all of your users.
One of the benefits of cloud-hosted services is that
enrollment process that doesn’t require training. Token-based
servers, maintenance and monitoring are covered by the
solutions are often more expensive to distribute and manage
SUPPORT & HELP DESK
provider’s network and security engineers, lightening the load
than they are to buy.
Live support via email, chat, and/or phone should also be
for your team.
included in your vendor’s service – but sometimes support
ADMINISTRATOR SUPPORT Depending on your solution, you may have to manually
costs extra. Consider how much time is required to support
To make it easy on your administrators, look for drop-in upgrade to the latest version. Some vendors may only update
your end users and help-desk staff, including troubleshooting
integrations for major apps, including APIs, to cut time and a few times a year, which can leave you susceptible to new
time. For enterprises with large IT departments, it’s not
resources needed for implementation. See if you can set vulnerabilities and exploits. Choose a vendor that updates often,
uncommon for help desk tickets related to tokens to account
up a pilot program for testing and user feedback – simple and rolls out automatic updates without any assistance from
for 25 percent of the overall IT support workload.
integrations should take no longer than 15 minutes. your team.
If a solution requires extensive support from your IT or
infrastructure teams, will you get charged for the time spent
supporting your on-premises two-factor solution? Estimate that
cost and factor it into your budget.
Token-related help desk tickets can
account for 25% of the IT support workload.
8
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
Modern Solutions
High value, upfront costs
++ No data center/server maintenance ++ User, device and application access policies
and controls
++ High availability configuration
++ Single sign-on (SSO) and cloud support
++ Automatic security and app updates
NO HIDDEN COSTS
−− Administrative software/hardware
−− Administrative support
9
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
Time to Value
Time to value, or time to security, refers to the time spent implementing, deploying, and adapting to the solution. Determine how
long it takes before your company can start realizing the security benefits of a two-factor authentication solution – particularly
important after a recent breach or security incident.
deploy faster since they Also, to save on Single Sign-On (SSO) integration time, check
that your two-factor solution supports the Security Assertion
With a mobile cloud-based solution, users can quickly
download the app themselves onto their devices. A solution that
don’t require hardware Markup Language (SAML) authentication standard that
delegates authentication from a service provider or application
allows your users to download, enroll and manage their own
10
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
Required Resources
Consider the time, personnel and other resources required to integrate your applications, manage users and devices, and maintain/
monitor your solution. Ask your provider what they cover, and where you need to fill in the gaps.
Security Impact
(continued)
AVAILABILITY VISIBILITY
Duo protects against downtime, ensuring high availability with With Duo’s Device Insight, IT admins can gain insight into the
FLEXIBILITY
distribution across multiple geographic regions, providers security posture of both corporate and personal devices used
As a cloud-based solution, it’s easy to provision new users and
and power grids for seamless failover. Duo ensures an uptime to connect to company applications and services, without the
protect new applications with Duo as your company grows,
exceeding 99.995% with a hard service level guarantee, with use of agents.
since there are no limits or additional charges per application.
premium private hosting available. Duo’s servers are hosted
Duo’s solution also provides detailed security logs that track
Easily onboard new users with Duo’s self-enrollment, bulk
across independent PCI DSS and ISO 27001-certified and
events related to users, administrators and telephony activity,
enrollment or Active Directory synchronization options. Learn
SSAE 16-audited service providers with strong physical security
you can quickly create custom reports, ideal for security
about User Provisioning.
to ensure your service is always available.
analysis and compliance auditors. Learn more about Reporting.
With Duo’s two factor, you get the most upfront value with no hidden costs, including: BUDGET CONSOLIDATION
++ A simple subscription model priced per user, billed annually, ++ Automatic application updates, with patch management, With Duo, you can replace the need for multiple different
with no extra fees for new devices or applications maintenance and live support at no extra cost hardware and software security solutions that solve for isolated
use cases, like authentication, network access control, endpoint
++ A free authentication mobile app that users can download ++ Advanced features that let you customize policies and
security, vulnerability assessment tools, etc. with a single cloud
themselves controls, as well as get device data
service that provides two-factor authentication, device insight,
++ A high availability configuration, disaster recovery and data ++ A secure single sign-on (SSO) and authentication solution
single sign-on and endpoint policies and controls.
center management in one
Duo’s Trusted Access solution provides a comprehensive
++ Easy deployment with the help of Duo’s drop‑in integrations
security platform that eliminates the need — and budget —
for all major apps and APIs, and an administrative panel for
for many disparate security tools that may prove difficult to
user and solution management
fully integrate.
Other solutions may appear to come with a lower price tag, but the layers of hidden costs can add up fast, quickly
tripling TCO and offering less value overall.
Other solutions may appear to come with a lower price tag, but
the layers of hidden costs can add up fast, rapidly tripling TCO
and offering less value overall.
15
INTRODUCTION SECURITY IMPACT STRATEGIC INITIATIVES COST OF OWNERSHIP TIME TO VALUE REQUIRED RESOURCES THE DUO ADVANTAGE
Duo is flexible enough to scale quickly, letting you easily add new
apps, users, or change security policies as you grow.
16
“Duo increased our security
and was an easy tool to deploy;
every organization should
consider it immediately.”
Chad Spiers
Director of Information Security, Sentara Healthcare
Duo Security makes security painless, so you can focus on what’s important. Duo’s scalable, cloud-based
Trusted Access platform addresses security threats before they become a problem, by verifying the identity
of your users and the health of their devices before they connect to the applications you want them to access.
Thousands of organizations worldwide use Duo, including Dresser-Rand Group, Etsy, Facebook, K-Swiss,
Paramount Pictures, Random House, SuddenLink, Toyota, Twitter, Yelp, Zillow, and more. Duo is backed by
Google Ventures, True Ventures, Radar Partners, Redpoint Ventures and Benchmark. Duo is located from
coast to coast and across the sea.