Try our new research platform with insights from 80,000+ expert users

Share your experience using Starling Two-Factor Authentication

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 102,000+ reviews on PeerSpot:

reviewer2802351 - PeerSpot reviewer
Director at a tech vendor with 10,001+ employees
Real User
Feb 11, 2026
Multi-factor protection has secured all user access and simplifies single sign-on integration
Pros and Cons
  • "Regarding the stability and reliability of Cisco Duo, it is very good."
  • "Cisco Duo did not help reduce the cost of the overall authentication method that we have in our company; instead, it increased, obviously."

What is our primary use case?

My main use case for Cisco Duo is providing MFA for all of our users and use cases.

The first focus with Cisco Duo is securing externally available applications, such as SaaS applications. Mostly, we ingest or enforce Cisco Duo via our SSO IDP point because then we do not have to worry about the native integration with whatever application we are trying to secure. If it is SSO capable, we inject Cisco Duo into that.

What is most valuable?

When it came about, I was a big fan of the risk-based authentication feature of Cisco Duo. That was a big win. Additionally, the Verified Push after the Cisco breach was important, as Cisco recognized that they had to do something about that and they came up with the Verified Push, which is also a very good idea. Nowadays, if I would have known a couple years back what I know today, I would not have worried about that too much because I would have just moved over to passwordless and phishing-resistant MFA means in the first place.

What needs improvement?

The major improvement I would suggest for Cisco Duo would have been to collaborate with Microsoft more closely and get positioned in a way as a recognized MFA authentication method on Entra. Since Microsoft forced all of their customers to enforce MFA when logging into anything in the Microsoft universe, Cisco Duo was not a recognized way of doing that. It was enforced as an external authentication method, as Microsoft calls it, and it was not a native Cisco Duo integration. Even the external one was not possible to select as a default, so we had to use something else along with it, which for us was Microsoft. That was very annoying.

Cisco Duo did not help reduce the cost of the overall authentication method that we have in our company; instead, it increased, obviously. Cisco Duo was the first technology that we introduced, which had to not just change or implement a certain technology. That was the easy part; the hard part was changing the habits and the culture, getting people to accept what MFA is and to go through the hassle of MFA every single time. The total cost of ownership increased, along with the implementation and the license cost, as well as the reluctance of users to handle IT systems. Security is always a fine balance, where we have to explain to the users what we are doing, why we are doing it, and not overdo it.

Where it lagged behind a lot is in the RDP integration, because we have users, especially in Germany or other jurisdictions, where we cannot force users to use their phone. Therefore, we had to give them some kind of Passkeys, and they are not supported in every use case, or if they are accepted, it is extremely tedious. With standards such as OAuth or FIDO2, that can vastly be improved. Apart from that, it is a very solid MFA solution.

For how long have I used the solution?

I have been using Cisco Duo for seven or eight years.

What do I think about the stability of the solution?

Regarding the stability and reliability of Cisco Duo, it is very good. It always does exactly what it is supposed to do, with no downtime over the years that we have had it in use, despite the issues I mentioned with Microsoft, where we were not able to integrate Cisco Duo at all.

Which solution did I use previously and why did I switch?

Prior to Cisco Duo, I did not use another MFA solution; that was the first one.

How was the initial setup?

I would describe the experience of deploying Cisco Duo as super simple. It was straightforward, one of the easiest consoles I ever had to implement.

What was our ROI?

I can still say that I have seen a return on investment from Cisco Duo, as having MFA is a basic requirement nowadays. MFA is considered state-of-the-art if you look at things such as GDPR or any other information security framework, so not having MFA means you cannot put a price tag on that because you will be hit with ransomware immediately.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup costs, and licensing of Cisco Duo is that we have it as part of an Enterprise License Agreement, so that is probably not comparable.

Which other solutions did I evaluate?

Before adopting Cisco Duo, I evaluated a couple of other solutions, but at that time, Cisco Duo won out primarily because it was available as part of the Enterprise License Agreement, and we were a big Cisco shop already.

What other advice do I have?

I am not using Cisco Identity Intelligence.

I have not noticed an increase in phishing attacks recently in my organization because we are pretty well set up in terms of email protection.

I just learned about the Proximity Verification capability with Cisco Duo. We do not have it because we are already using Passkeys, so we no longer need Proximity Verification.

I did not deploy Cisco Duo Directory to manage the user identity.

I would give this review an overall rating of 8.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Feb 11, 2026
Flag as inappropriate
AmrJayyousi - PeerSpot reviewer
Head Of Information Security Section at a financial services firm with 1,001-5,000 employees
Real User
Feb 11, 2026
Strong authentication has protected remote access and now simplifies managing VPN user accounts
Pros and Cons
  • "It is a great system regarding multi-factor authentication, specifically after we did the integration with Active Directory, allowing us to manage the users who use the VPN, our main gateway for VPN Cisco ASA Secure, with full administration."
  • "I rate it a nine because there is still a specific feature regarding Cisco Duo Desktop that must be enabled and optimized better than the current situation."

What is our primary use case?

In my current role, I have been Head of the Information Security section for two years. Before that, I was a network and security administrator for more than 13 years.

Regarding Cisco Duo Mobile, I am currently the admin for the portal, managing more than 500 users. It is a great system regarding multi-factor authentication, specifically after we did the integration with Active Directory, allowing us to manage the users who use the VPN, our main gateway for VPN Cisco ASA Secure, with full administration.

An important feature that saves time is the automatic unlock; when an employee forgets to approve or deny three times in a row, Cisco Duo Mobile portal locks their account. There is a feature to automatically unlock it within five or six minutes, allowing the time for this automatic unlock to be determined.

What is most valuable?

One important benefit of using Cisco Duo solution is to ensure that the person using the VPN has their username, password, and mobile; they must approve or decline if they do not have their mobile. Another important benefit is managing users who have access to the VPN because sometimes there are users designed to have access, but the system administrator forgets to remove them, which we can effectively manage from the portal itself.

What needs improvement?

I have not implemented Cisco Duo's end-to-end phishing resistance.

No additional features are needed at this time.

I rate it a nine because there is still a specific feature regarding Cisco Duo Desktop that must be enabled and optimized better than the current situation. It is not about mobile but about the desktop functionality.

For how long have I used the solution?

I graduated with a Management Information System degree 15 years ago, and all of my experience is based in the financial sector.

What do I think about the stability of the solution?

I assess the stability and reliability of Cisco Duo solution as mainly stable, safe, and at 98%.

What do I think about the scalability of the solution?

Cisco Duo scales well with the growing needs of our company; we partner with Cisco, and since all of our components are Cisco, we are always attending Cisco Live EMEAR every year, finding new solutions and technologies, importing new products to our data center regularly.

I have not expanded the usage of Cisco Duo since the first implementation.

How are customer service and support?

Cisco customer support is great.

The reason for this is that all of the Cisco TAC engineers at support are fantastic. They are available 24/7, and they do not leave sessions unresolved; when an engineer's shift ends, they assign a colleague to continue solving the case.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before adopting Cisco Duo, I did not use a different solution.

How was the initial setup?

My experience deploying Cisco Duo is great and went smoothly.

What went well is that you primarily need a license to access the main admin portal and at least two servers with minimum specifications, making it easy to configure. It is straightforward, requiring just one certificate.

What about the implementation team?

I encourage anyone considering implementing Cisco Duo to move to Cisco Duo Mobile.

Which other solutions did I evaluate?

I did not evaluate other solutions from other vendors before implementing Cisco Duo.

What other advice do I have?

Recently I have seen an increase in phishing attacks in our organization. These attacks feel like they are getting more sophisticated. 

I did the integration with Active Directory instead of deploying Cisco Duo Directory to manage user identities. In the financial sector, Cisco Duo is fine as it is.

Regarding the price, the pricing of Cisco Duo is okay.

The main reason to implement Cisco Duo is that all of our data center infrastructure is Cisco. If we connect everything, the visibility will be 100%, which is why we need to cover everything with Cisco.

I am currently using Cisco Identity Intelligence.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Feb 11, 2026
Flag as inappropriate