![]() ![]() ![]() For example, if Duo Trust Monitor identifies a suspicious login from a risky location, a Duo administrator can set a geolocation restriction in response. When Duo Trust Monitor highlights anomalous activity, this informs better, more tailored policy. The visibility Duo Trust Monitor provides, combined with Duo’s expressive policy engine, lies at the center of Cisco’s zero-trust for the workforce strategy – linking risk detection directly to access control. While many tools on the market rely on simple or static rules, Duo Trust Monitor looks at access patterns more holistically - taking into account extended access history and context between multiple variables, such as device and location. ![]() Once Duo Trust Monitor observes these access patterns, it surfaces risky logins to help the security team identify suspicious activity and aid in the investigation of compromised accounts. The feature will be available in Duo Access and Beyond editions.ĭuo Trust Monitor analyzes real-time authentication data to create a baseline of normal user behavior at the point of login. That’s why I’m proud to announce the general availability of Duo Trust Monitor, Duo’s machine learning-driven risk detection, starting Thursday, November 19. However, establishing trust over time, and consistently and continuously monitoring access granted to users, is a challenge for organizations that have had to quickly evolve their access strategy in light of remote work. Duo combines human control with ML-driven automation to help safely enable remote workĪ modern, zero-trust security architecture ensures that only authorized users using safe devices gain access to corporate applications. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |