We use it for two-factor authentication for end-user and administrator login. We wanted to secure our endpoints.
Systems Engineer Virtualization at a engineering company with 501-1,000 employees
Easy to use and integrates well with the rest of our cloud-based Cisco ecosystem
Pros and Cons
- "The single pane of glass management is very important and it is part of the reason we went with Duo. Anything we can do to save time for our administrators, help desk staff, and engineers, is valuable to us."
- "I wouldn't mind seeing some options for remembering a device for a short period of time or a specific login, particularly for administrative engineering staff, as we may be logging in to four or five different services."
What is our primary use case?
What is most valuable?
The single pane of glass management is very important and it is part of the reason we went with Duo. Anything we can do to save time for our administrators, help desk staff, and engineers, is valuable to us.
What needs improvement?
I wouldn't mind seeing some options for remembering a device for a short period of time or a specific login, particularly for administrative engineering staff, as we may be logging in to four or five different services. We're having to use it a lot. I understand it, it's just part of it. That's not specific to Duo. That's two-factor authentication in general.
For how long have I used the solution?
I've been using Duo Security for about a year.
Buyer's Guide
Cisco Duo
December 2025
Learn what your peers think about Cisco Duo. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
What do I think about the stability of the solution?
It's stable. We haven't had any downtime that I can recall or any problems with maintaining network connectivity.
Any issues we've had have been local to a specific user. Maybe the phone number was not set up right or there was some conflict as a result of somebody changing a device, but it's always been pretty straightforward to get that kind of thing resolved.
What do I think about the scalability of the solution?
We started off with a small deployment and, in one or two steps, sent it out to everybody and it scaled fine. We didn't have to change anything in our setup.
We have about 1,200 users across 60 branches around the U.S. We occasionally have people using it internationally and we're able to handle that fine with our geographic location blocking or allowing, as the case may be. It's a fully virtualized environment. We have a lot of remote users, people who work in remote fields. As long as they have a cell signal, it works.
How are customer service and support?
I have not had to deal with any support for Duo. The less I have to talk to support the better, for sure.
Which solution did I use previously and why did I switch?
This is our first venture into two-factor authentication.
We didn't have a specific problem we were trying to solve when we got it. We were just trying to add more and more security. We did have regulatory requirements for two-factor authentication and that is what drove it.
How was the initial setup?
The deployment of Duo Security was mainly a project done by our network and security team, but I was involved in it to some extent. I found it pretty straightforward. As enterprise-wide security solutions go, it wasn't too bad.
We got it integrated with Active Directory. There were some struggles there that I don't know the specifics of because our network team was working on that. But once everything was set up, it was pretty easy to add a new user and do whatever we wanted to.
It took a little time for our users to get used to it, but everybody took to it pretty well. The users don't really have to interact with it other than getting their push notifications. For them, it's easy. It requires minimal training. It pops up and it's all pretty self-explanatory.
Which other solutions did I evaluate?
It's pretty easy to use as two-factor authentication systems go. We evaluated a few others, including the Microsoft two-factor authentication, a little bit, and one other, and Duo ended up being our favorite. Part of that was because we're in that Cisco ecosystem and we were able to integrate it with our other services that are all cloud-based. It fit in pretty well for us, and it would for anybody with a similar setup.
Duo was also the least obtrusive to the user and the ease of administration through the administrative portal was a little better.
What other advice do I have?
Fortunately, we haven't had to evaluate it when it comes to helping us remediate threats more quickly, but we're confident that it will.
Regarding resilience in cyber security, two-factor is definitely a must-have. We're satisfied with it as far as that goes, in addition to it fulfilling our regulatory requirements.
For our use case, for logins, it just works.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Aerospace Engineer at a manufacturing company with 10,001+ employees
Enables us to pick out unsuccessful login attempts quickly and shut down those accounts proactively
Pros and Cons
- "The ability for users to authenticate via phone, from any random phone number, has been very helpful for managing a distributed workforce. Using it across a distributed network for securing access to our applications is big for us."
- "We have users who move throughout the world, and their levels of connectivity change. It can be a challenge, if someone is in Bahrain, to authenticate via Duo."
What is our primary use case?
We wanted multi-factor authentication across a variety of platforms.
How has it helped my organization?
It's improved security by enforcing strong, reliable multi-factor authentication, and it has reduced intrusions across our organization. It makes sure all the user sessions are at least a little more trustful than if we just had single-factor.
In terms of remediating threats, we are able to pick out unsuccessful login attempts pretty quickly on the Duo platform and we can shut down those accounts. It makes us more proactive. That works well.
What is most valuable?
The ability for users to authenticate via phone, from any random phone number, has been very helpful for managing a distributed workforce. Using it across a distributed network for securing access to our applications is big for us. It works very well, and we have no major complaints about the integration of any of our third-party applications.
We have a high level of confidence in the platform, especially for identifying potential logins from unexpected geolocations. The data associated with logs is very helpful for helping to make that determination.
It's very important for us that Duo Security considers all resources to be external, especially as we lead up to Zero Trust. It needs to be like that.
What needs improvement?
End-users find it more annoying than anything else. It's tough to manage user perception of the service, especially when there isn't feature parity between Mac and Windows users. There are some challenges in making that user experience the same between platforms and helping users feel the least amount of burden possible while helping to ensure the organization's security.
Network connectivity depends on where users are located. Internally, on-premises, it's not hard keeping connectivity, but we have users who move throughout the world, and their levels of connectivity change. It can be a challenge, if someone is in Bahrain, to authenticate via Duo.
For how long have I used the solution?
I have been using Duo Security for two years.
What do I think about the stability of the solution?
We've had no issues with the stability of Duo. I consider it to be a stable product.
What do I think about the scalability of the solution?
It has scaled to meet our needs. I don't know how it scales if you have 10,000 or 20,000 users, but for our organization, with fewer than 5,000 users, it's been fine.
How are customer service and support?
The technical support has been adequate. They are responsive regarding support for troubleshooting tickets. We haven't had any issues that required escalation, so we've been happy with it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did have a previous solution. The interoperability has been improved with Duo compared to that solution.
How was the initial setup?
Our physical deployment of the solution is in the continental United States, but our users are worldwide.
What other advice do I have?
I don't place too much value on any single product, since placing too much trust in one thing creates a single point of failure. This is just a single piece in a broader spectrum of security products to accomplish our actual goals.
Building resilience is nice, but there's a point of diminishing returns when it comes to doing that. Part of my job is to help our leaders understand where that diminishing return is.
The single pane of glass management is desirable, but it's like a unicorn. No single pane of glass is ever really a single pane of glass. That's something that would be nice, but it's not something I expect.
Duo is a very consistent product and flexible in how it can be deployed and has good support. It's a product we're very happy with.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Duo
December 2025
Learn what your peers think about Cisco Duo. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
IT Security manager at a energy/utilities company with 201-500 employees
A highly-scalable multi-factor authentication solution
Pros and Cons
- "The multi-factor authentication process and the geo-locking features are great."
- "We had some trouble with the password reset function."
What is our primary use case?
When our users are connecting to our Cisco VPN, Duo effectively ensures that they are who they say they are by taking a second factor into account, such as the cell phone that was used to create their profile. To do this, it sends them a second mode of authentication, such as a PIN or push confirmation. It also geo-locks who is allowed to actually log into our systems. We have it locked to the continental United States and Puerto Rico, and one outsourcing firm that we work with.
Once you have it set up, all you really have to do is add people to a group in the active directory and send them the instructions on how to do it. If you have a lower technical user base, you may have to walk them through it. But once it's set up, it really is automatic.
Not a single person from our IT staff really needed anything other than the instructions. Of the 15 people in our test group, nobody actually needed instructions on how to use it either — beyond what I just wrote up and sent them.
As we get to the older population in our company, the less technical population, we're probably going to have to walk them through it or hold their hands a little bit.
Within our organization, there are currently 15 employees using this solution. Eventually, we will have all 221 office staff users with it set up. Still, we'll probably top out at about 80 users a day.
We will increase the overall usage as our users increase. So, if we hire another 10 people, then we'll buy another license.
What is most valuable?
The multi-factor authentication process and the geo-locking features are great. It provides us with statistics about the devices that are used to perform the second authentication factor.
Upon successful connection, it tells us where and what device is being used to perform the second authentication factor. For example, when I log in with it, we'll see that I have my iPhone 11 and that it is located in the area via its IP address.
What needs improvement?
We had some trouble with the password reset function. When a user's password is expired, you can prompt them using Cisco AnyConnect — a password management feature — to change their password in the same channel during the login process. We had a lot of trouble configuring that. As a result, we now have a second channel that bypasses Duo to allow them to reset their password.
For this, we needed Cisco support, Duo support, and our network administrator all lined up. It should have just been something that they could have just configured, but they weren't able to do it in the same channel. We had to actually create a second channel. When you do this, people will try to log on and it'll tell them that their password is incorrect. They'll realize that their password is expired because it's been 90 days. Afterward, they'll have to then go back to AnyConnect, change the channel that they're logging into, attempt to log in, get the password prompt, disconnect from the AnyConnect, and then reconnect using the Cisco Duo multifactor authentication — this is extremely complicated.
Still, it's really only a problem for a small subset of users. The ones who ignore the notifications 10 days before saying, "Hey, change your password." So, it's not as big of a deal as it sounds. Just by having a functional way to do it, it makes it so that if nobody's on staff, the user can reset their own password without having to call us in the middle of the night on a Saturday, because that's the best time for those passwords to expire.
Also, it would be nice if it was easier to modify the splash screen that comes up when entering your username and password.
For how long have I used the solution?
We actually just configured Duo Security — we're in the process of pushing it out. Currently, we've been using it for the past three to four months.
What do I think about the scalability of the solution?
Scalability is definitely up there. It could easily handle many, many, many more authentications than we are currently or ever would use. It could definitely go far beyond what we are currently using.
How are customer service and technical support?
The technical support agents are definitely knowledgeable; they give us plenty of recommendations on how to do things. They are very quick to send us white papers describing how to fix things ourselves.
Although they try to push us toward a self-help model, they do eventually get online with us via a WebEx chat with the Cisco reps and help us out. We've never really had any problems finding somebody from chat support that wouldn't jump on to the WebEx meetings with Cisco premium support.
Which solution did I use previously and why did I switch?
We didn't have anything covering multifactor authentication. We were using Cisco AnyConnect with the tie-in to the active directory, but we just had the single factor — the username and password. Duo allowed us to greatly enhance our security. Now, not only do users have to know their username and password, but they also have to be able to receive the second-factor authentication in order to get in. The same goes for anyone trying to break in.
How was the initial setup?
The initial setup was complex, but due to the support that we received during the onboarding, it was very simple with the exception of the password reset channel that I mentioned earlier that we tried to use but didn't end up doing. The way we have it set up now is actually how it was configured during the onboarding process. It just would've been nice to have had it functionally work — to have that all in one channel.
What about the implementation team?
Regarding deployment, we have an in-house person, but we still had Cisco Duo onboarding support to assist us with the setup. If you have a CCNA, you'll probably be able to do it yourself, but it's just much easier to do it with onboarding support.
The functional part of the onboarding process only took roughly an hour. Including troubleshooting our channel issue, we spent roughly 16 hours before we just decided to go back to the original build.
What's my experience with pricing, setup cost, and licensing?
Our licensing fee is currently on an annual basis.
There are two levels of support with Duo that we were considering. The first level of support is just the two-factor authentication — it doesn't do anything else. But the second level of support provides us with network access control. This basically allows us to say, "Hey, your iPhone hasn't been updated in 10 years, update your iPhone to continue using this service." Or, "Your Windows device does not have updates." It also provided us with the geolocation feature. We were experiencing a lot of break-in attempts from Moldavia. So, thanks to this feature, we just locked out Moldavia. If nobody in Moldavia can connect to our system, then nobody in Moldova can hack us.
What other advice do I have?
If you're interested in using this solution, be sure to get the onboarding team to set everything up during the onboarding phase. Set up a proxy server if you can and get them to do everything during the onboarding phase — then you won't have any problems.
Compared to the after-purchase support, the onboarding people are a lot more willing to just take over your computer and set things up for you.
Overall, on a scale from one to ten, I would give this solution a rating of ten — it's the best.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CTO at a wellness & fitness company with 10,001+ employees
One-stop application for multiple MFAs that helped us consolidate tools
Pros and Cons
- "Duo Security improved my organization by helping us secure all access points within the company infrastructure."
- "Duo Security could be improved with the addition of more applications."
What is our primary use case?
Our primary use case for Duo Security is all user access to email.
How has it helped my organization?
Duo Security improved my organization by helping us secure all access points within the company infrastructure.
Duo Security helped our company consolidate tools, including email and VPN.
What is most valuable?
What I find most valuable about Duo Security is that it is our one-stop application for multiple MFAs.
What needs improvement?
Duo Security could be improved with the addition of more applications.
Duo Security has not helped free up our IT department's time.
For how long have I used the solution?
I have been using Duo Security for six months.
What do I think about the stability of the solution?
Duo Security's stability is perfect.
What do I think about the scalability of the solution?
Duo Security's ability to scale is perfect. We have 5,000 people using it in four countries.
How are customer service and support?
I have never used Duo Security's support.
Which solution did I use previously and why did I switch?
We previously used integrated multi-factor security from Microsoft 365 and Fortinet FortiToken. We made the switch to Cisco because we wanted to handle everything in one application.
How was the initial setup?
I was not involved in the initial deployment. I do know however that 10 people were involved in the deployment.
What was our ROI?
We have seen a return on investment because with Duo Security, we do not have to pay for multiple applications. Instead, we pay for one solution.
What's my experience with pricing, setup cost, and licensing?
The cost of Duo Security licensing is OK.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Vendor Business Manager EMEA at a tech services company with 10,001+ employees
Beneficial viability, good authentication, and reliable
Pros and Cons
- "The most valuable features of Duo Security are visibility and OTP authentication. The OTP is very important because it is a self-enrollment feature, you are able to enroll users very quickly with a shorter time period."
- "Duo Security could improve by being more compatible with other vendors."
What is our primary use case?
Duo Security is multi-factor authentication, specifically a two-factor authentication. It authenticates users so that you can know they're legitimate in the network. It can be used for mobile banking. For example, when you're doing mobile or internet banking with your phone, when it uses OTP, it is using Duo Security.
What is most valuable?
The most valuable features of Duo Security are visibility and OTP authentication. The OTP is very important because it is a self-enrollment feature, you are able to enroll users very quickly with a shorter time period.
What needs improvement?
Duo Security could improve by being more compatible with other vendors.
For how long have I used the solution?
I have been using Duo Security for many years.
What do I think about the stability of the solution?
The solution is highly reliable.
What do I think about the scalability of the solution?
Duo Security is sized per user. You can even have Duo Security for five users or 3,000 users. It depends on the size of the organization.
The solution is scalable.
How are customer service and support?
The technical support is of a very high level. If you have a problem they will be able to support you. They are able to log in remotely as an engineer to give assistance. If you have the upgraded license then the support is even better and they will do everything for you if you have a problem. The support is extremely good.
How was the initial setup?
The installation is very easy to do for Duo Security and it can be done with one person in one hour.
What about the implementation team?
We have one person for maintenance of the solution and they do not need a lot of training to be able to do it. There is a manual that can be followed.
What's my experience with pricing, setup cost, and licensing?
The licensing is very good because it does not cost a lot of money. It's affordable for all-sized customers, including enterprises. There is an additional cost for premium support.
The license can be purchased monthly, quarterly, half-year, or annual.
What other advice do I have?
I would recommend this solution to others. I have seen it being used in large banks and there has never been a complaint about them. It is a very good solution.
I rate Duo Security an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Head of IT and Security at a consultancy with 11-50 employees
Stable, easy to set up, and has useful push notifications, integrations, and mobile app
Pros and Cons
- "The push notifications and the integrations they offer are valuable. Their mobile app is very useful. It is very easy to use."
- "The only time I really had some negative feedback for them was about the UI of their mobile app, but they improved it in the last version. It is good on the functionality side, but their pricing model is a little bit weird. Currently, there is no price advantage in signing up for yearly contracts. If you are on a monthly term or a yearly contract, you basically pay the same price, and that is very unusual. Normally, there is a discount when someone signs up for the 12-month system."
What is our primary use case?
Duo Security provides multi-factor authentication for anything that requires multi-factor authentication. It could be our internal corporate services, such as a single sign-on portal, or applications, such as Google Cloud.
How has it helped my organization?
It is very easy for users to enroll. There are a lot of insights that we get from using the app on devices that people use to authenticate.
What is most valuable?
The push notifications and the integrations they offer are valuable. Their mobile app is very useful. It is very easy to use.
What needs improvement?
The only time I really had some negative feedback for them was about the UI of their mobile app, but they improved it in the last version. There was no way to (re)name 3rd party OTP accounts so it got confusing when multiple ones were existing. In addition, each account took a lot of space on the screen, they condensed it in the new version to make it easier for people that have a lot of accounts added. Duo has a beta program and actively solicits and listens to feedback which personally I think is great.
It is good on the functionality side, but their pricing model is a little bit weird. Currently, there is no price advantage in signing up for yearly contracts. If you are on a monthly term or a yearly contract, you basically pay the same price, and that is very unusual. Normally, there is a discount when someone signs up for the 12-month system.
For how long have I used the solution?
I have been using this solution probably since 2014. In this company, we have been using it for two years in total.
What do I think about the stability of the solution?
It is stable. Over the last six or seven years, I didn't have any issues where something wasn't working.
What do I think about the scalability of the solution?
The maximum number of users that I have had is around 600, and I haven't found any issues there. In my current organization, every employee is using this solution. We have 250 employees.
How are customer service and technical support?
I have not interacted with them. I never had to open a support case.
Which solution did I use previously and why did I switch?
We didn't have anything in place.
How was the initial setup?
It is pretty straightforward. I just need to log in to an account and integrate systems that should be using Duo Security. That's basically it. It probably took me an hour to roll out the accounts.
What about the implementation team?
IT support helps users if they run into problems with the application, but that's about it. There is no separate team for its maintenance and deployment. There are a lot of service options for our users. They don't even need to contact IT support. On a new phone, they can even do it on their own.
What was our ROI?
It has provided ROI.
What's my experience with pricing, setup cost, and licensing?
Their pricing model is a little bit weird. Currently, there is no price advantage in signing up for yearly contracts. There are no additional costs to the standard licensing costs.
Which other solutions did I evaluate?
We looked briefly at Okta Verify. It is the Verify app from Okta to use a single sign-on provider. It had the same price but far less functionality. It was a no-brainer to just go with Duo Security.
What other advice do I have?
I would advise others to look at the integrations that are available and see if they can roll it out to as many applications as they can. Encourage users to use Duo Push versus the six-digit pin code that the applicant generates.
I would rate Duo Security a nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cybersec Consultant at a consultancy with self employed
The best solution that meets our security needs and is very stable, scalable, and easy to use
Pros and Cons
- "It meets our security needs very well. It is easy to use, and documentation is also available. It is also very stable and scalable, and its support is also very good. We are satisfied with this solution."
- "Its documentation must be in French because we are a French-speaking country. They should also provide more training documentation. Its management interface should also be improved. They should also improve its update period. If I compare its update period with other products such as Palo Alto firewalls, this solution is really slow in updates."
What is our primary use case?
We are using it for perimeter protection.
How has it helped my organization?
We are using it to protect the DMZ servers of our organization. It protects our DMZ servers from malware and web attacks.
What is most valuable?
It meets our security needs very well. It is easy to use, and documentation is also available.
It is also very stable and scalable, and its support is also very good. We are satisfied with this solution.
What needs improvement?
Its documentation must be in French because we are a French-speaking country. They should also provide more training documentation.
Its management interface should also be improved. They should also improve its update period. If I compare its update period with other products such as Palo Alto firewalls, this solution is really slow in updates.
For how long have I used the solution?
I have been using this solution since October 2019.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
It is very scalable. In my company, I have between 90 to 100 users. We also have some users who are working at another site.
We have plans to increase its usage, but due to COVID, we're mostly working remotely.
How are customer service and technical support?
Their technical support is very good. They are very reactive. The last issue for which I contacted them was related to an OS update.
Which solution did I use previously and why did I switch?
We have used Check Point and Palo Alto solutions previously.
How was the initial setup?
It is very easy for me. I work with a lot of solutions like this. Its deployment took two weeks.
What's my experience with pricing, setup cost, and licensing?
Its price is reasonable. It is not highly expensive.
Which other solutions did I evaluate?
We evaluated lots of options from different vendors.
What other advice do I have?
I would recommend this solution. Duo Security is the best solution for the cybersecurity challenges that we are facing nowadays.
I would rate Duo Security a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a healthcare company with 51-200 employees
Helps to log in to Citrix, VPN and servers
Pros and Cons
- "I love Duo Security's push notifications. It's simple, fast, and secure. From the user's perspective, the solution is seamless. The security aspect is great."
- "We already have Active Directory enabled in our routers and switches. However, if we could do two-factor authentication, then it could go a long way since no one's getting into them unless you want them to."
What is our primary use case?
We try to use the solution for pretty much everything that we can use with it. The tool helps us to get into our dashboard APIs, and log into Citrix, VPN, and servers.
What is most valuable?
I love Duo Security's push notifications. It's simple, fast, and secure. From the user's perspective, the solution is seamless. The security aspect is great.
For how long have I used the solution?
We have been using the product for about two to three years in our company.
What do I think about the stability of the solution?
I haven't seen any reason to think the solution is unstable.
What do I think about the scalability of the solution?
The product is very scalable from what I have seen.
How are customer service and support?
The solution's support is pretty good. It helped us quite a bit. Both Meraki and TAC have been pretty helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We switched to Duo Security due to the cybersecurity threats that came with COVID. There was a big one that came against us at one time, but we were able to squash it pretty quickly. The threat was not able to get into the mainframe because of the solution.
How was the initial setup?
The tool's setup was easy and we didn't require too much outside help to set it up.
What was our ROI?
As a network and security guy, security is my return and it has been better with the product's use.
What other advice do I have?
I would rate the solution a nine out of ten. Duo Security can get spotty at the back end but it doesn't break. It would be great if I could use the product to log into the routers or switches in the infrastructure. We already have Active Directory enabled in our routers and switches. However, if we could do two-factor authentication, then it could go a long way since no one's getting into them unless you want them to. We are all for more security in healthcare.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Cisco Duo Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Product Categories
Authentication Systems Single Sign-On (SSO) Access Management ZTNA as a Service Cisco Security Portfolio Multi-Factor Authentication (MFA)Popular Comparisons
Microsoft Entra ID
Cisco Umbrella
Prisma Access by Palo Alto Networks
Cisco Identity Services Engine (ISE)
Zscaler Zero Trust Exchange Platform
Cloudflare One
Okta Platform
Cato SASE Cloud Platform
Fortinet FortiAuthenticator
Ping Identity Platform
Check Point Harmony SASE (formerly Perimeter 81)
Auth0 Platform
Cisco Secure Client (including AnyConnect)
Cisco Secure Endpoint
Yubico YubiKey
Buyer's Guide
Download our free Cisco Duo Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Duo Security compare with Microsoft Authenticator?
- How would you compare Cisco Duo Security with other Authentication Systems products?
- Which solution do you prefer: Duo Security or RSA SecurID Access?
- When evaluating Authentication Systems, what aspect do you think is the most important to look for?
- Why is Authentication Systems important for companies?
- Which front-end product for authorization and authentication into an Apache Web Server application, PIXIA, would you recommend?
- What is the difference between SPML and SAML?
- How would you compare Cisco Duo Security with other Authentication Systems products?
- What is CAPTCHA and how does it work? How can you use it for Artificial Intelligence (AI)?
- What are some alternatives for UserLock?












