19 - 20 SEPTEMBER 2018 / Stockholmsmässan
Duo Security

Duo Security

Stand: 202

Duo Security is a cloud-based Trusted Access provider protecting thousands of the world’s largest and fastest-growing companies and organizations, including University of York, Etsy, Facebook, K-Swiss, Paramount Pictures, Random House, Toyota, Twitter, Yelp, Zillow and more. Duo’s innovative and easy-to-use technology can be quickly deployed to protect users, data and applications from breaches, credential theft and account takeover. The Ann Arbor, Michigan-based company also has offices in San Mateo, California; Austin, Texas and London. Duo is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at https://duo.com.

Exhibitor Website

Duo Security Seminars

  • Beyond The Hype; How Attackers Win Wed 20th Sep 13:30 - 14:00

    Beyond The Hype; How Attackers Win

    Movies, TV and even some non-fictional press leads most to believe that a cyber attack is a complicated endeavor conducted by teams of highly skilled people. The reality is, that most successful attacks are not complicated in the least. This presentation will highlight real world attacks, why the attackers were successful and how they could have been stopped. Some new open source tools to battle phishing will be covered as well as a strategy to deal with disappearing network perimeter. 

    Speaker

    Steve Manzuik

    Steve ManzuikMore

    Time / Place

    Wed 20th Sep 13:30 to 14:00

    Cyber Threat Protection Theatre

White papers

Duo Security and King.com
A4-print-KingPressRelease-Final1.docx.pdf 137.79 kB


Facebook Case Study : How the Social Media Giant Secured Their Engineers and Protected More Than 10,000 Users
“Facebook is very fast-paced and we needed technologies that would allow us to maintain that pace. Because of the ease of use of Duo Security authentication technologies, we have seen minimal support and overhead costs.”

facebook.pdf 647.90 kB


Two-Factor Authentication Evaluation Guide
In this guide, you'll get: -A comprehensive set of criteria to customise your evaluation to your organisation’s needs -An overview of the hidden costs of a two-factor solution and how to determine your return on investment (ROI) -And more

Two-Factor Authentication Evaluation Guide (2).pdf 3.55 MB


The Trouble With Phishing
Phishing is one of the most common threats hitting organisations. This guide details the problems around phishing, how it works, and how Duo can be leveraged as a solution.

the-trouble-with-phishing-guide (1).pdf 438.74 kB


The 2017 Duo Trusted Access Report - The Current State of Enterprise Endpoint Security
The enterprise perimeter has been redefined by new networking models – and with new tech, come new security risks.

duo-trusted-access-report-2017 (2).pdf 2.02 MB


Moving Beyond the Perimeter_ Part 1
The Theory Behind Google’s BeyondCorp Security Model

Moving Beyond the Perimeter_ Part 1.pdf 324.00 kB


Moving Beyond the Perimeter_ Part 2
How To Implement The BeyondCorp Security Model

moving-beyond-the-perimeter-part-2.pdf 302.61 kB


Top