Realize adaptive, multi-factor authentication (MFA) and proactively reduce the risk of a data breach with Duo from Cisco. Verify users’ identities, gain visibility into every device, and enforce adaptive policies to secure access to every application.
Overview
Integrations
Access security for everyone, from any device, anywhere. For organizations of all sizes that need to protect sensitive data at scale, Duo is the user-friendly zero-trust security platform for all users, all devices, and all applications.
With Duo, you can:
Confirm user identities in a snap.
Monitor the health of managed and unmanaged devices.
Set adaptive security policies tailored for your business.
Cisco Secure Endpoint (AMP4E) Cisco Systems, Inc.Cisco Secure Endpoint is a next generation endpoint security solution that prevents, detects, and responds to threats. A cloud managed solution, Cisco Secure Endpoint:
Cisco Secure Endpoint (AMP4E) Cisco Systems, Inc.Cisco Secure Endpoint is a next generation endpoint security solution that prevents, detects, and responds to threats. A cloud managed solution, Cisco Secure Endpoint:
Cisco Secure Endpoint is a next generation endpoint security solution that prevents, detects, and responds to threats. A cloud managed solution, Cisco Secure Endpoint:
Availability
CloudBlue partnersDirectly from vendor
Cisco Webex 3.0 Cisco Systems, Inc.The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.
Cisco Webex 3.0 Cisco Systems, Inc.The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.
The service directly enables service providers to add new revenue streams. This offering is a comprehensive solution that enables service providers to expand their market share, automate, grow recurring revenue, and increase customer stickiness.
Availability
CloudBlue partnersDirectly from vendor
Cisco Secure Email Cloud Mailbox Cisco Systems, Inc.Cisco Secure Email Cloud Mailbox is an integrated, cloud-native security solution for Microsoft 365 that focuses on simple deployment, easy attack remediation, superior visibility, and best-in-class efficacy from Cisco Talos. It augments native Microsoft 365 security and provides complete visibility into inbound, outbound, and internal user-to-user messages.
Cisco Secure Email Cloud Mailbox Cisco Systems, Inc.Cisco Secure Email Cloud Mailbox is an integrated, cloud-native security solution for Microsoft 365 that focuses on simple deployment, easy attack remediation, superior visibility, and best-in-class efficacy from Cisco Talos. It augments native Microsoft 365 security and provides complete visibility into inbound, outbound, and internal user-to-user messages.
Cisco Secure Email Cloud Mailbox is an integrated, cloud-native security solution for Microsoft 365 that focuses on simple deployment, easy attack remediation, superior visibility, and best-in-class efficacy from Cisco Talos. It augments native Microsoft 365 security and provides complete visibility into inbound, outbound, and internal user-to-user messages.
Availability
CloudBlue partnersDirectly from vendor
Cisco Stealthwatch Cisco Systems, Inc.Cisco Stealthwatch Cloud by IM improves security and incident response across the distributed network, from the private network and branch office to the public cloud.
Cisco Stealthwatch Cisco Systems, Inc.Cisco Stealthwatch Cloud by IM improves security and incident response across the distributed network, from the private network and branch office to the public cloud.
Cisco Stealthwatch Cloud by IM improves security and incident response across the distributed network, from the private network and branch office to the public cloud.
Availability
CloudBlue partnersDirectly from vendor
Cisco DNA Spaces Cisco Systems, Inc.Cisco DNA Spaces by IM is the next-gen indoor location services platform. Our cloud transforms your Wi-Fi into a powerful sensor, unlocking insights and trends from the behavior of people and things in your buildings.
Cisco DNA Spaces Cisco Systems, Inc.Cisco DNA Spaces by IM is the next-gen indoor location services platform. Our cloud transforms your Wi-Fi into a powerful sensor, unlocking insights and trends from the behavior of people and things in your buildings.
Cisco DNA Spaces by IM is the next-gen indoor location services platform. Our cloud transforms your Wi-Fi into a powerful sensor, unlocking insights and trends from the behavior of people and things in your buildings.
Availability
CloudBlue partnersDirectly from vendor
Cisco Webex 2.0 Cisco Systems, Inc.Cisco Webex by IM delivers complete collaboration from the cloud, connecting people and teams anytime, anywhere. Whether you are having a quick discussion or working on a project from start to finish, we deliver meetings, team collaboration, and calling capabilities designed to optimize business productivity.
Featured
Cisco Webex 2.0 Cisco Systems, Inc.Cisco Webex by IM delivers complete collaboration from the cloud, connecting people and teams anytime, anywhere. Whether you are having a quick discussion or working on a project from start to finish, we deliver meetings, team collaboration, and calling capabilities designed to optimize business productivity.
Featured
Cisco Webex by IM delivers complete collaboration from the cloud, connecting people and teams anytime, anywhere. Whether you are having a quick discussion or working on a project from start to finish, we deliver meetings, team collaboration, and calling capabilities designed to optimize business productivity.
Availability
CloudBlue partners
Cisco Umbrella Cisco Systems, Inc.Cisco Umbrella by IM provides the first line of defense against threats on the internet wherever users go. Umbrella delivers complete visibility into internet activity across all locations, devices and users, and it blocks threats before they ever reach your network or endpoints.
Featured
Cisco Umbrella Cisco Systems, Inc.Cisco Umbrella by IM provides the first line of defense against threats on the internet wherever users go. Umbrella delivers complete visibility into internet activity across all locations, devices and users, and it blocks threats before they ever reach your network or endpoints.
Featured
Cisco Umbrella by IM provides the first line of defense against threats on the internet wherever users go. Umbrella delivers complete visibility into internet activity across all locations, devices and users, and it blocks threats before they ever reach your network or endpoints.
Nodeware – Vulnerability Management – Cyber Security IGI CyberNodeware provides complete and continuous visibility of your network, its assets, and the vulnerabilities that put your business at risk—all while running silently in the background during normal business hours. Nodeware was developed by cybersecurity practitioners and combines new device recognition with vulnerability scanning. It enables businesses to easily monitor their network, identify security gaps, and access detailed reports in order to achieve security compliance and protect their networks.
Nodeware – Vulnerability Management – Cyber Security IGI CyberNodeware provides complete and continuous visibility of your network, its assets, and the vulnerabilities that put your business at risk—all while running silently in the background during normal business hours. Nodeware was developed by cybersecurity practitioners and combines new device recognition with vulnerability scanning. It enables businesses to easily monitor their network, identify security gaps, and access detailed reports in order to achieve security compliance and protect their networks.
Nodeware provides complete and continuous visibility of your network, its assets, and the vulnerabilities that put your business at risk—all while running silently in the background during normal business hours. Nodeware was developed by cybersecurity practitioners and combines new device recognition with vulnerability scanning. It enables businesses to easily monitor their network, identify security gaps, and access detailed reports in order to achieve security compliance and protect their networks.
Availability
Directly from vendor
Conceal Browse Conceal Inc.[Fast-Track product] ConcealBrowse protects every endpoint and every user from malicious, unknown URLs and sends them to remote isolation, while allowing known ‘good’ URLs to continue down their normal path. ConcealBrowse makes proactive decisions about the security risk associated with internet use and automatically isolates risky transactions.
Conceal Browse Conceal Inc.[Fast-Track product] ConcealBrowse protects every endpoint and every user from malicious, unknown URLs and sends them to remote isolation, while allowing known ‘good’ URLs to continue down their normal path. ConcealBrowse makes proactive decisions about the security risk associated with internet use and automatically isolates risky transactions.
[Fast-Track product] ConcealBrowse protects every endpoint and every user from malicious, unknown URLs and sends them to remote isolation, while allowing known ‘good’ URLs to continue down their normal path. ConcealBrowse makes proactive decisions about the security risk associated with internet use and automatically isolates risky transactions.
Availability
Directly from vendor
ActZero Managed Detection & Response MDR ActZero, Inc.[Fast-Track product] ActZero delivers an outcome-focused Managed Detection & Response solution. We use dozens of machine learning detections to automate threat identification & response; finding, containing & remediating threats faster. With intelligent response automation & 24/7 SOC, we block fast-moving ransomware attacks, filter out false positives and white noise, escalating only critical alerts. We give clients the visibility & security guidance needed to prioritize threat and vulnerability management.
ActZero Managed Detection & Response MDR ActZero, Inc.[Fast-Track product] ActZero delivers an outcome-focused Managed Detection & Response solution. We use dozens of machine learning detections to automate threat identification & response; finding, containing & remediating threats faster. With intelligent response automation & 24/7 SOC, we block fast-moving ransomware attacks, filter out false positives and white noise, escalating only critical alerts. We give clients the visibility & security guidance needed to prioritize threat and vulnerability management.
[Fast-Track product] ActZero delivers an outcome-focused Managed Detection & Response solution. We use dozens of machine learning detections to automate threat identification & response; finding, containing & remediating threats faster. With intelligent response automation & 24/7 SOC, we block fast-moving ransomware attacks, filter out false positives and white noise, escalating only critical alerts. We give clients the visibility & security guidance needed to prioritize threat and vulnerability management.
Availability
Directly from vendor
Carbide Securicy Data Solutions Ltd. dba Carbide[Fast-Track product] Carbide’s information security and privacy management platform, geared toward high-growth businesses, takes the guesswork and pain out of building, proving, and sustaining a security and privacy program strong enough to satisfy both today’s compliance expectations and tomorrow’s threats.
Carbide Securicy Data Solutions Ltd. dba Carbide[Fast-Track product] Carbide’s information security and privacy management platform, geared toward high-growth businesses, takes the guesswork and pain out of building, proving, and sustaining a security and privacy program strong enough to satisfy both today’s compliance expectations and tomorrow’s threats.
[Fast-Track product] Carbide’s information security and privacy management platform, geared toward high-growth businesses, takes the guesswork and pain out of building, proving, and sustaining a security and privacy program strong enough to satisfy both today’s compliance expectations and tomorrow’s threats.