Multi-factor authentication Cisco DUO

Multi-factor authentication Cisco DUO

Share post

Netzlink expands its security solution portfolio to include Cisco DUO multi-factor authentication. The Braunschweig IT system house Netzlink Informationstechnik GmbH, a long-standing “Cisco Premium Certified Partner”, is expanding its service portfolio with Cisco DUO to include adaptive multi-factor authentication (MFA).

The new solution effectively supports companies in reliably protecting the system and data access of employees, for example from the home office, from mobile devices or other external work environments, with additional security features. In addition, the solution facilitates mobile device management (MDM for short, management of mobile devices) in the company and temporarily blocks devices in circulation as soon as compliance and security requirements are violated.

Multi-factor authentication of an SSL VPN access

Spying out passwords via phishing mails, malware-laden images in social media networks or lost mobile devices with keyloggers are scenarios that occur again and again today. The protection of the information and data network is therefore a top priority for companies. In particular, if many employees regularly request access to the company network via remote workstations or mobile devices, the principle of “zero trust” should apply. This means that companies must first clearly ensure the individual trustworthiness of the respective employee, even before they gain access to the sensitive information networks, applications or IT environments.

Cisco DUO - flexibility meets usability

“The multi-factor authentication by Cisco DUO is not only an elementary component in the implementation of data security requirements and zero trust in company networks or multi-cloud environments. It also offers companies a high degree of flexibility in the integration of the most varied of environments as well as the simplest usability for users and administrators. While other leading 2-factor authentication solutions often only support Microsoft Office 365 or Google Cloud services without the manual entry of six to eight-digit token IDs, with Cisco DUO a simple confirmation is sufficient for any local or cloud-based services the automated push notification - if necessary also as single sign-on (SSO).

This also creates a high level of acceptance among users for additional access protection, ”explains Michael Gellhaus, Systems Engineer at Netzlink Informationstechnik GmbH. "But the administration is also simplified sustainably with Cisco DUO: Access security guidelines can be implemented very individually based on users, groups, devices, applications or the respective application risk. If, for example, SSL VPN access, logging on to the Windows system or access to a specific folder is to be secured by multi-factor authentication, this can be done conveniently and regardless of location using the DUO Cloud Dashboard with just a few clicks. In this way, secure access for any number of remote workstations can be guaranteed within a very short time. "

Simple mobile device management with Cisco DUO

More mobile devices, more cloud applications and more connections - in view of the increasing number of accesses to corporate networks, it is now more important than ever to maintain control over the data traffic. Cisco DUO not only checks the identity of the user, but also allows valuable insights into the security parameters of the end device used. The administrator receives a notice immediately whether the mobile devices are e.g. B. supplied with the latest patches or security-relevant apps are still "up-to-date". If individual devices or clients do not meet the current security requirements, access can be automatically blocked until the weak points have been resolved, for example through updates.

 

More on this at Netzlink.com

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more