Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Cisco Duo - Advantage Edition

Cisco Systems, Inc.

Reviews from AWS customer

8 AWS reviews

External reviews

557 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    reviewer2802210

Process of authentication takes less time compared with other tools

  • February 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case is for Cisco SSE.

What is most valuable?

It's fast. The whole process takes lesser time compared to other tools we've used before which is very helpful.

What needs improvement?

I think we'd need more experience to learn Cisco Duo because we're just at the beginning of using it.

For how long have I used the solution?

I used Cisco Duo since last year.

What do I think about the stability of the solution?

It's quite stable so it is reliable.

How are customer service and support?

I rate this solution a nine out of ten.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

We have, but Cisco Duo was definitely the choice we made because we've been partners with Cisco for a long time so trust is built.

How was the initial setup?

It was handled by a different team but I know that there were some challenges and they were quickly resolved it because there was a collaboration between Cisco and Emerson.


    reviewer2801991

Identity intelligence has reduced detection time and now improves control over risky user behavior

  • February 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use cases for Cisco Duo are to start using it for multifactor authentication and then to enforce the controls around endpoints and user behavior, and also the Identity Intelligence part to ensure a holistic approach around identity security.

What is most valuable?

As a CISO, I like the Cisco Duo Identity Intelligence feature the most because it allows me to collect a lot of insights and reduce the time to detect issues on identity.

An example of how Cisco Duo helped in my organization is that we reduced the time to detect anomalies in user or identity usage within our organization.

Now with the automation in Cisco Duo, we are able to open a ticket in three minutes after the platform is able to understand that there is something wrong, whereas previously, it could take hours for our CM to understand and correlate to understand that there was something that was not good happening.

What needs improvement?

At the moment, I believe that more integration between Cisco Duo Identity Intelligence and the classic Cisco Duo console can be improved, since it is still a separate platform, and when I click on Identity Intelligence, I have to open a new window and log in again.

For how long have I used the solution?

I have been using Cisco Duo for four years now.

What do I think about the stability of the solution?

I did not experience any crashes or downtime related to Cisco Duo; there were no issues at all.

What do I think about the scalability of the solution?

The scalability of Cisco Duo in my organization is pretty easy; it is very scalable, and you can start easy and then little by little increase the tuning of the platform in order to achieve a higher level of identity security.

How are customer service and support?

Since I did not have any problems, I did not really use customer service, but I was able to talk with the Cisco Duo product team because we tested the Directory part a little bit earlier than others, and I had a good experience with them.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I have used other solutions before; initially, we were under Microsoft with their multifactor authentication system, but it was lacking some risk context and the risk control that Cisco Duo offers. Two years ago, we compared it with Google's multifactor authentication solution, but again, they were lacking some features that Cisco Duo has.

How was the initial setup?

I had no challenges with Cisco Duo deployment; we simply tested when running a pilot before the final rollout, which was very easy. We leverage a lot of smart working and remote working in our company, so we did not have the opportunity to have everyone at the office for training. Therefore, we pushed everything remotely, and everything worked perfectly.

What was our ROI?

I can say I have seen a return on investment from having Cisco Duo, as the deployment was not hard to do, saving time for our IT team, and we are able to block a lot of identity risks and issues. Although I have not calculated it, there is definitely a good return on investments.

What's my experience with pricing, setup cost, and licensing?

Regarding the experience of pricing, setup cost, and licensing for Cisco Duo, the setup cost was easy, and the licensing is pretty easy, not with so many levels. For example, the Identity Intelligence feature was a good surprise because it came with our actual licensing, so we didn't have to purchase an additional license. For pricing, we included it inside an enterprise agreement, which allowed us to get a good discount because it was together with other licenses.

What other advice do I have?

We are using Cisco Duo Identity Intelligence as well.

Cisco Duo Identity Intelligence has helped to improve the visibility of the identity risks because it is the platform that allowed us to gain more logs and more telemetry around identity.

I have not noticed any increase in phishing attacks in my organization recently, since last August, when there was a peak in August followed by a new level that was higher than before.

I feel the phishing attacks I am dealing with are maybe not harder but more frequent, and the volume of the phishing messages is raising little by little, while the complexity of the phishing campaigns is growing.

We have implemented the Cisco Duo end-to-end phishing-resistant solution.

For high-risk applications, I use a different level of controls, and we have enabled proximity verification in our organization.

The proximity check in Cisco Duo works fine, and it is easy to use, so my colleagues and employees are not so frustrated by the fact that they have to enter new data or clear a new level of authentication.

We are in the process of rolling out the Directory in the coming months, and we expect to perform a migration in March, so we are close to enrolling and using the Directory pretty soon.

I found that the Identity Intelligence feature was very interesting and an unexpected add-on because at the very beginning, it was not part of Cisco Duo four years ago.

I now have the Identity Intelligence feature, which makes me very happy, and it was indeed the big feature, the big step ahead that we achieved thanks to Cisco Duo.

I would rate this review as a 9.


    Albert Trippenzee

Security has become simpler while a single dashboard now provides clear visibility into user devices

  • February 12, 2026
  • Review provided by PeerSpot

What is our primary use case?

Cisco Duo is primarily used for two-factor authentication to access the company network.

What is most valuable?

The features of Cisco Duo that I appreciate most include an administrator's ability to see an overall view of what types of devices users use, which helps identify risks from endpoints that might not be secure enough anymore, and you can see it in one single glance.

The benefit of this feature for my company is that it provides an easy view to see what users are doing, especially with the challenge of bring your own device. Many companies do not want to provide a company device but allow users a budget to buy what they need. If someone wants an expensive iPhone, they have to contribute some of their own money to fit it within their budget, which avoids extra costs for the company while still providing insight into what users are doing.

What needs improvement?

Regarding the pricing, setup costs, and licensing, I find that for some companies using Azure, they question why they should switch when they already have Microsoft Authenticator, which can make it commercially challenging when explaining why they need to transition to Cisco Duo. I believe you do not want everything with Azure, but it is advantageous to have your security through a security or network company, which can sometimes be difficult to communicate.

There could be better communication in explaining to customers why they need Cisco Duo. Some customers, even at high management levels, express confusion about why they should pay when a free option is available.

What do I think about the stability of the solution?

I have not experienced any downtime or performance issues with Cisco Duo. There was one instance of a connection problem, but support resolved it in just a couple of hours.

What do I think about the scalability of the solution?

Cisco Duo scaled very smoothly to meet my company's growing needs and fits our requirements very well.

How are customer service and support?

When evaluating the support and technical service of Cisco Duo, I find it excellent. The team understands problems quickly and helps us very efficiently. I would rate the customer service and technical support a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Prior to adopting Cisco Duo, I was using Microsoft Authenticator for two-factor authentication as the only other option.

The factors that influenced my consideration for a change were scalability, as it can be utilized for more than just basic needs, and the insight it provides. I appreciate that not only can a user log in with their passcode, but administrators have visibility into user activity, allowing you to see a single dashboard view in Cisco Duo, which is very easy.

How was the initial setup?

My experience with deploying Cisco Duo was that it worked well. The first time for me, I thought this is it and it is working.

What was our ROI?

I have not really seen a return on investment with Cisco Duo, as for me it is more about including Cisco Duo if it is part of the deal when we design a new network and security is required, and two-factor authentication is needed.

From a partner or integrator perspective, I believe Cisco Duo has helped reduce overall authentication-related costs, as the backend is very easy to manage. In large projects, I estimate the reduction in costs with Cisco Duo might be around twenty to twenty-five percent, sometimes more, sometimes less. It depends on the specific situation, but the ease of use and the efficiency of the help desk also contribute to this, as I had a good experience when I needed them once.

For me, the choice to invest in Cisco Duo pays off as I see it as an essential component when selling a network, incorporating it within the discussion around security and Zero Trust principles.

Which other solutions did I evaluate?

In considering other solutions before choosing Cisco Duo, Microsoft Azure with Microsoft Authenticator came up as a competitor, and in the enterprise, I think Cisco Duo stands out as one of the biggest competitors I know, primarily because of how easy it is to integrate on the backend.

What other advice do I have?

I think Cisco Duo is doing a great job overall. If I look at it and compare it to other two-factor authentication tools, the backend is very insightful.

It is already very easy to add Cisco Duo at your website or service, such as with Cisco Meraki, where the integration is very seamless, but also with tools against key loggers. It is just click, next, next, and it is always working for me.

The winning point for Cisco Duo over others is its simplicity. It is just a security solution in a box, and it integrates very easily.

My advice to other companies considering Cisco Duo is to do a trial to check it out and see at the backend what capabilities you have, and then try it. I would rate this product an eight out of ten overall.


    Gardar Svansson

Strong multifactor protection has improved remote access security and simplified user management

  • February 12, 2026
  • Review provided by PeerSpot

What is our primary use case?

Cisco Duo is used for multi-factor authentication for VPN users and remote access users. I only use the MFA feature of Cisco Duo, and the application is excellent. The dashboards and everything about managing the product is clean and intuitive.

What is most valuable?

Cisco Duo benefits the company by increasing the security footprint, and it is easy to manage users, disable users, or bypass if needed in case of an emergency. The MFA feature is particularly strong, with an excellent application interface. The dashboards and everything about managing the product is clean and intuitive.

What needs improvement?

I have not implemented Cisco Duo's end-to-end phishing resistance with capabilities such as proximity verification. I am very happy with Cisco Duo as it is and would not be able to name a feature that could be improved. It was easy to set up and manage, making it an excellent product.

I am uncertain whether Cisco Duo should focus on AI or cost-effectiveness. It is not an expensive product for our company size, and I am unsure what AI could benefit in the solution.

For how long have I used the solution?

I have been working in my area of expertise for about 12 years.

What do I think about the stability of the solution?

I have not experienced any downtime with Cisco Duo proxy or the Cisco Duo service in the setup. The only downtime occurs when upgrading the proxy server.

What do I think about the scalability of the solution?

Cisco Duo scales with the growing needs of the company straightforwardly. I have not implemented the other features of Cisco Duo such as Passport, but purchasing more licenses and adding more users is simple.

How are customer service and support?

I have never had to reach out to Cisco Duo's customer service or technical support, so I cannot comment from experience, but I am confident they are competent at what they do.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

Prior to adopting Cisco Duo, I was using YubiKey.

Before choosing Cisco Duo, I considered YubiKey. I had been using YubiKey for some time, but when evaluating a platform to perform multi-factor authentication for the organization, I advocated strongly for Cisco Duo because I had been using the Cisco Duo product for a long time for all two-factor authentication needs, and I was already satisfied with the product.

I did not set up YubiKey, so I am not familiar with its technical specifications. YubiKey is a physical key on a keychain that is inserted into a USB port, and they are prone to breaking. Cisco Duo has always been on my mobile phone, making it simple to transfer everything when my phone breaks or I receive a new one.

How was the initial setup?

My experience with deploying Cisco Duo was straightforward, following the documentation. The only issue I encountered was that the documentation was somewhat outdated regarding the file structure of Cisco Duo proxy, but this was not difficult to resolve in a few minutes.

What about the implementation team?

I started the implementation, and then another project took priority, which is why Cisco Duo Directory has not been deployed.

What's my experience with pricing, setup cost, and licensing?

Pricing for Cisco Duo is good, at least for the company size and scale. The setup process was simple. Cisco Duo provides excellent documentation on everything from the proxy and the RADIUS, and how the two should connect. It was a straightforward process, and I was up and running in about one day.

Which other solutions did I evaluate?

Before choosing Cisco Duo, I considered YubiKey. I had been using YubiKey for some time, but when evaluating a platform to perform multi-factor authentication for the organization, I pushed hard for Cisco Duo because I had been using the Cisco Duo product for a long time for all two-factor authentication needs, and I was already satisfied with the product.

What other advice do I have?

I have tried Cisco Duo Directory to manage user identities, but it has not been deployed yet.

I am not currently using Cisco Identity Intelligence.

I have not noticed any increase in phishing attacks in the company recently.

I would rate Cisco Duo a 10 because it is easy to manage, quick to set up, and offers good value for the price point, contributing to the organization's security. I would recommend going straight with Cisco Duo because it offers probably the best value for the price point, and setup is quick to reach a testing phase.

Cisco Duo has not helped the company reduce overall authentication-related costs, but the organization does gain value from it, even though there is a cost involved.


    Lasha Lomjaria

Strong authentication has simplified secure access and supports evolving identity projects

  • February 12, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use cases for Cisco Duo in my company start with multi-factor authentication, but I also have projects when I use Cisco Duo for things like mobile posture check and so on.

What is most valuable?

The features of Cisco Duo that I prefer the most include, first of all, 2FA. 2FA is pretty good because it is simple, and the simple way is what all users love. That is the top feature for Cisco Duo. I also appreciate all the features overall. I appreciate that with Cisco Duo, many people may think that it was just for 2FA, but now it functions as a full identity provider. That is a pretty good upgrade. I like the whole product and how it increases and develops on a huge scale.

I can tell you that for my company, these features benefit us because we work for other customers, so we help them to use these features. When we listen to the client and when we hear that there is something we can use, for example, Cisco Duo, it will be 2FA, it will be for device posture check, and so on. We are offering Cisco Duo straight away because, first of all, we have expertise in Cisco Duo, we know this product, and we have good experience with it.

What needs improvement?

I would think about how Cisco Duo can be improved, but currently, with all of its features, I believe that it is enough, more than enough. However, Cisco Duo is making surprising updates because you do not know that a feature exists, but then the next day you find out that it is available on Cisco Duo and it works very well.

For how long have I used the solution?

I have been using Cisco Duo for more than three years, and it has been quite a good experience. The first time I had the opportunity to use this product, it was interesting that it was so easy to work with. I also have to mention that all the documentation that administrators or users would like to have is all available and easy to get. It is pretty easy.

What do I think about the stability of the solution?

I would assess the stability and reliability of Cisco Duo as excellent. For these three years that I have been working with Cisco Duo, I have not had any incident or downtime because of Cisco Duo being down.

What do I think about the scalability of the solution?

Cisco Duo scales with the growing needs of my clients' companies very well. When we are starting to work with Cisco Duo, clients come to us and they are asking us for a multi-factor authentication solution. They start with this, but when they know the other features that are behind Cisco Duo, they learn that it is bigger than that and the features are more extensive. When our clients know the features, they are stepping towards using these new features progressively.

How are customer service and support?

I would evaluate customer service and technical support, but I have not had the experience to work with them.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

My clients chose Cisco Duo over Okta because we told them that Cisco Duo, in this case, is much better. Additionally, it is easy to work with.

How was the initial setup?

I would describe the experience of deploying Cisco Duo as easy because I have mentioned several times that I appreciate Cisco Duo because it is so easy to work with. The deployment part is pretty easy. You have all this documentation, and you are just making several clicks and some changes, and you are up and running. You just have to deploy these mobile clients. The one thing Cisco Duo does not need to improve is the easiest part because I do not know what they can do to make it even easier.

What was our ROI?

I believe Cisco Duo has helped my company and my clients reduce their overall authentication-related costs. I would like to tell some numbers, but I am just an architect, and I do not have this kind of data.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing shows that pricing depends on the license. For the essential license, I think the pricing is pretty normal. Regarding the Premier licensing, it is a little bit pricey, but it is in the market range with the competitors.

Which other solutions did I evaluate?

Other solutions my clients consider before choosing Cisco Duo include competitors such as Okta, for example. Okta was the main competitor.

What other advice do I have?

My advice for other companies that are considering getting Cisco Duo is to try it, and you will be amazed at how easy and how productive this tool is. I would rate this review a nine out of ten.


    reviewer2802351

Multi-factor protection has secured all user access and simplifies single sign-on integration

  • February 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Cisco Duo is providing MFA for all of our users and use cases.

The first focus with Cisco Duo is securing externally available applications, such as SaaS applications. Mostly, we ingest or enforce Cisco Duo via our SSO IDP point because then we do not have to worry about the native integration with whatever application we are trying to secure. If it is SSO capable, we inject Cisco Duo into that.

What is most valuable?

When it came about, I was a big fan of the risk-based authentication feature of Cisco Duo. That was a big win. Additionally, the Verified Push after the Cisco breach was important, as Cisco recognized that they had to do something about that and they came up with the Verified Push, which is also a very good idea. Nowadays, if I would have known a couple years back what I know today, I would not have worried about that too much because I would have just moved over to passwordless and phishing-resistant MFA means in the first place.

What needs improvement?

The major improvement I would suggest for Cisco Duo would have been to collaborate with Microsoft more closely and get positioned in a way as a recognized MFA authentication method on Entra. Since Microsoft forced all of their customers to enforce MFA when logging into anything in the Microsoft universe, Cisco Duo was not a recognized way of doing that. It was enforced as an external authentication method, as Microsoft calls it, and it was not a native Cisco Duo integration. Even the external one was not possible to select as a default, so we had to use something else along with it, which for us was Microsoft. That was very annoying.

Cisco Duo did not help reduce the cost of the overall authentication method that we have in our company; instead, it increased, obviously. Cisco Duo was the first technology that we introduced, which had to not just change or implement a certain technology. That was the easy part; the hard part was changing the habits and the culture, getting people to accept what MFA is and to go through the hassle of MFA every single time. The total cost of ownership increased, along with the implementation and the license cost, as well as the reluctance of users to handle IT systems. Security is always a fine balance, where we have to explain to the users what we are doing, why we are doing it, and not overdo it.

Where it lagged behind a lot is in the RDP integration, because we have users, especially in Germany or other jurisdictions, where we cannot force users to use their phone. Therefore, we had to give them some kind of Passkeys, and they are not supported in every use case, or if they are accepted, it is extremely tedious. With standards such as OAuth or FIDO2, that can vastly be improved. Apart from that, it is a very solid MFA solution.

For how long have I used the solution?

I have been using Cisco Duo for seven or eight years.

What do I think about the stability of the solution?

Regarding the stability and reliability of Cisco Duo, it is very good. It always does exactly what it is supposed to do, with no downtime over the years that we have had it in use, despite the issues I mentioned with Microsoft, where we were not able to integrate Cisco Duo at all.

Which solution did I use previously and why did I switch?

Prior to Cisco Duo, I did not use another MFA solution; that was the first one.

How was the initial setup?

I would describe the experience of deploying Cisco Duo as super simple. It was straightforward, one of the easiest consoles I ever had to implement.

What was our ROI?

I can still say that I have seen a return on investment from Cisco Duo, as having MFA is a basic requirement nowadays. MFA is considered state-of-the-art if you look at things such as GDPR or any other information security framework, so not having MFA means you cannot put a price tag on that because you will be hit with ransomware immediately.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup costs, and licensing of Cisco Duo is that we have it as part of an Enterprise License Agreement, so that is probably not comparable.

Which other solutions did I evaluate?

Before adopting Cisco Duo, I evaluated a couple of other solutions, but at that time, Cisco Duo won out primarily because it was available as part of the Enterprise License Agreement, and we were a big Cisco shop already.

What other advice do I have?

I am not using Cisco Identity Intelligence.

I have not noticed an increase in phishing attacks recently in my organization because we are pretty well set up in terms of email protection.

I just learned about the Proximity Verification capability with Cisco Duo. We do not have it because we are already using Passkeys, so we no longer need Proximity Verification.

I did not deploy Cisco Duo Directory to manage the user identity.

I would give this review an overall rating of 8.


    AmrJayyousi

Strong authentication has protected remote access and now simplifies managing VPN user accounts

  • February 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

In my current role, I have been Head of the Information Security section for two years. Before that, I was a network and security administrator for more than 13 years.

Regarding Cisco Duo Mobile, I am currently the admin for the portal, managing more than 500 users. It is a great system regarding multi-factor authentication, specifically after we did the integration with Active Directory, allowing us to manage the users who use the VPN, our main gateway for VPN Cisco ASA Secure, with full administration.

An important feature that saves time is the automatic unlock; when an employee forgets to approve or deny three times in a row, Cisco Duo Mobile portal locks their account. There is a feature to automatically unlock it within five or six minutes, allowing the time for this automatic unlock to be determined.

What is most valuable?

One important benefit of using Cisco Duo solution is to ensure that the person using the VPN has their username, password, and mobile; they must approve or decline if they do not have their mobile. Another important benefit is managing users who have access to the VPN because sometimes there are users designed to have access, but the system administrator forgets to remove them, which we can effectively manage from the portal itself.

What needs improvement?

I have not implemented Cisco Duo's end-to-end phishing resistance.

No additional features are needed at this time.

I rate it a nine because there is still a specific feature regarding Cisco Duo Desktop that must be enabled and optimized better than the current situation. It is not about mobile but about the desktop functionality.

For how long have I used the solution?

I graduated with a Management Information System degree 15 years ago, and all of my experience is based in the financial sector.

What do I think about the stability of the solution?

I assess the stability and reliability of Cisco Duo solution as mainly stable, safe, and at 98%.

What do I think about the scalability of the solution?

Cisco Duo scales well with the growing needs of our company; we partner with Cisco, and since all of our components are Cisco, we are always attending Cisco Live EMEAR every year, finding new solutions and technologies, importing new products to our data center regularly.

I have not expanded the usage of Cisco Duo since the first implementation.

How are customer service and support?

Cisco customer support is great.

The reason for this is that all of the Cisco TAC engineers at support are fantastic. They are available 24/7, and they do not leave sessions unresolved; when an engineer's shift ends, they assign a colleague to continue solving the case.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before adopting Cisco Duo, I did not use a different solution.

How was the initial setup?

My experience deploying Cisco Duo is great and went smoothly.

What went well is that you primarily need a license to access the main admin portal and at least two servers with minimum specifications, making it easy to configure. It is straightforward, requiring just one certificate.

What about the implementation team?

I encourage anyone considering implementing Cisco Duo to move to Cisco Duo Mobile.

Which other solutions did I evaluate?

I did not evaluate other solutions from other vendors before implementing Cisco Duo.

What other advice do I have?

Recently I have seen an increase in phishing attacks in our organization. These attacks feel like they are getting more sophisticated.

I did the integration with Active Directory instead of deploying Cisco Duo Directory to manage user identities. In the financial sector, Cisco Duo is fine as it is.

Regarding the price, the pricing of Cisco Duo is okay.

The main reason to implement Cisco Duo is that all of our data center infrastructure is Cisco. If we connect everything, the visibility will be 100%, which is why we need to cover everything with Cisco.

I am currently using Cisco Identity Intelligence.


    Fawaz Sidheek

Mfa has strengthened compliance and reduced authentication costs for internal and external access

  • February 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our company's use case is that we are a service provider, basically a wholesale provider for the internet and the data we have. We have internal users as well as external service providers who want to connect to our company, and they use MFA from Cisco Duo.

What is most valuable?

The most valuable feature of Cisco Duo is the MFA itself, and the integration is pretty straightforward. The documentation is good.

Cisco Duo helps improve a company through security, and we have the regulatory compliances we have to meet by having Cisco Duo's MFA enabled. With Cisco Duo, we get that checkbox filled.

What needs improvement?

More documentation on how to integrate all the external applications would be beneficial for Cisco Duo. We have lots of third-party applications, especially our in-house applications, and additional documentation on how to integrate those applications for MFA using Cisco Duo would be helpful.

I evaluate the stability and reliability of the solution as somewhat tricky. Cisco Duo Access Gateway is mostly VM-based, and while I'm not sure whether there is an on-premises hardware-based solution, having this VM-based solution can be buggy. There are a lot of issues, and when something goes down or if there is an issue in the network, the whole solution goes down, affecting the whole company because the MFA is tied to login for an administrator and to login for a user. This needs to be improved; the solution, which includes the gateways and proxies connecting to it, needs to be more reliable.

For how long have I used the solution?

I have been using Cisco Duo for around five years.

What do I think about the stability of the solution?

I evaluate the stability and reliability of the solution as somewhat tricky. Cisco Duo Access Gateway is mostly VM-based, and while I'm not sure whether there is an on-premises hardware-based solution, having this VM-based solution can be buggy. There are a lot of issues, and when something goes down or if there is an issue in the network, the whole solution goes down, affecting the whole company because the MFA is tied to login for an administrator and to login for a user.

What do I think about the scalability of the solution?

The solution scales for us.

Scalability-wise, resources for the VM are mostly what is required, and we have them in-house. For the licenses, that aspect is covered with support.

How are customer service and support?

I have used support for Cisco Duo.

I evaluate Cisco's support as very good. We have the highest level of support, including a tech specialized support team dedicated to our account. We have weekly and monthly meetings where they advise us on what to do, how to proceed with upgrades, or any enhancements.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

When we went for an MFA, we were focused on Cisco Duo, and the way it functioned seamlessly integrated with our security policies. We did not evaluate others.

How was the initial setup?

My experience with the pricing, setup costs, or licensing for Cisco Duo is straightforward. We've had good interaction with the Duo team, and they always advise us. We have the highest level of support, so they come back to us with what is the recommended licensing, expiry, renewals, and pricing.

What was our ROI?

Cisco Duo has helped my organization reduce its overall authentication-related costs. The solution is pretty concise, not having a lot of tools or integration points like other providers.

When I look at the solution compared to other vendors, Cisco Duo is a one-stop shop for the whole MFA, so percentage-wise, I would say it's about 50%.

This 50% savings is over the five years.

What's my experience with pricing, setup cost, and licensing?

Evaluating the delivered cost, I find the choice to go with Cisco Duo is good. There were not many options available in the market. We had Cisco Duo, and we just appreciated the way it's delivered. It's functionally doing the MFA, and we went for it.

Which other solutions did I evaluate?

When we went for an MFA, we were focused on Cisco Duo, and the way it functioned seamlessly integrated with our security policies. We did not evaluate others.

What other advice do I have?

I am not currently using Cisco Identity Intelligence.

I have not noticed an increase in phishing attacks in my organization recently.

I have not implemented Cisco Duo's end-to-end phishing resistance.

We manage user identities through our own Active Directory internally, not through Cisco Duo Directory.

Cisco Duo integrates with other products well; I've not had an issue, except for the custom-based applications where we faced a lot of challenges. We had to work with the Cisco Duo team to integrate our service provider applications, OSS/BSS.

My overall review rating for Cisco Duo is 8.


    reviewer2802273

Security has improved as I control access, reduce shadow accounts, and cut unused apps

  • February 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

The main use cases for Cisco Duo are for people who don't have a multi-factor authenticator. This is concerning because when you work in IT, you assume you are talking to technical people. Sometimes they are a director of the IT department, and when I ask them, "What do you have for an MFA?" they respond, "We don't." So I say, "Okay, let's talk about Cisco Duo and how you can implement it in order to secure your organization." That's the main case.

We place Cisco Duo Identity Intelligence with the customers against Shadow IT because sometimes we have the feeling that the customers have a lot of platforms. They have thousands of accounts they are using. In general, customers are using around 100 SaaS applications in a company, and sometimes they don't really know what they have. Sometimes, some workers are not there anymore, and it's possible that they can lose track of who is still in the company and who is not. That's why with Cisco Duo Identity Intelligence, I am able to provide a complete overview of what they have. Now they can check who is still using the system. It's good against Shadow IT, but it's also good if you are paying for an app and you don't use it anymore. You can cancel the subscription and get some money back.

What is most valuable?

What is good with Cisco Duo is I have to explain that it's not just an MFA because some customers already have an MFA in place. I can talk about other products from Microsoft or any other product, and they say, "We already have an MFA." So I have to explain to them that Cisco Duo is not just an MFA. With an MFA, you want to access something, and the MFA is going to check if you can enter, yes or no. It's not going to check your background or what you have. Cisco Duo is a pre-MFA and post-MFA. With Cisco Duo it's checking if you are allowed to submit a request to access this. If your company is just working with Windows and you are trying to access with a Mac, Cisco Duo is going to be able to say, "Why are you working with a Mac? It's not allowed," so you're not going to have a request. Or if you are, for example, working in Germany and you only have workers in Germany, and suddenly your IP address is in Spain, then I can explain to the customer, "Okay." The customer might say, "Okay, I have a request from Spain, but we don't have people working in Spain, even remotely. So we will block it directly." That's the good thing. It's comparable to when you want to go to a nightclub, they ask you if you are 18, but they also check it with your ID card and everything. It's the same with Cisco Duo. They do a complete check of you before you access.

What needs improvement?

I have not implemented Cisco Duo's end-to-end phishing-resistant capabilities such as proximity verification.

I have not deployed Cisco Duo Directory to manage the user identities, not yet, because since a lot of customers already have their own directories, it was not necessary with Cisco Duo. We still talk about it, but it was not necessary as of right now.

For how long have I used the solution?

I have been using Cisco Duo for two years.

What do I think about the stability of the solution?

I would assess the stability and reliability of Cisco Duo as good. I have nothing to say. It's never had downtime, nothing. Cisco Duo cannot see your password. It's just sending the request. At no point in time does it see or save your password. That's also the good thing. And it's working with everything, and it's native on Linux. This means with some other products, I can get Linux to work, but I have to do some tricks. With Cisco Duo, it's already in. So if I have a server with Linux, it's perfect.

What do I think about the scalability of the solution?

I think Cisco Duo is scalable in a growing company and it works well. It's very scalable. I can add users, and as far as I remember, if I cross the line with the users, I will get a notification stating, "You need to upgrade," but it's not blocked. This means it's not that I add one user and now everything is locked. I have a lot of leeway. I can improve, and I will have a notification and still have time to pay more. Regarding the scalability, I just add one new customer, and after I upgrade my license directly from the dashboard as an admin, that's it. There's nothing else to do.

Which solution did I use previously and why did I switch?

I had something before Cisco Duo. It was a Windows MFA. I don't know the name. A Windows solution. But once again, the Windows solution is like, "Can you go in, or not? Is it you?" "But where are you? And is it really you?" That's the problem.

How was the initial setup?

The experience of the deployment with Cisco Duo is pretty rough. The software itself is good. The software itself is not the problem. The problem with customers is I have to change their habits. There are some people who don't want an MFA on their phone. It's easy for people who have a company phone and people who have a private phone. In some companies, they just have a private phone; they don't have a company phone. Since it's not always GDPR-friendly, with an MFA I can still send some information. Some people don't want to do it. I think it's rough in the sense that I have to educate the customers to use it and install it, because some people don't want to install it. Or if they really don't want an app, I still have the possibility to buy keys or to install a token on a USB key. But the deployment with the software itself is good. It's more about doing the education for the customers.

What was our ROI?

I have seen a return on investment with Cisco Duo. The good thing is the MFA is free. I can use it. I have Cisco Duo on my phone for free, so everybody can use and install it, up to 10 users. So it's good. I can start with this. The return on investment is that I present the product, and the customer, even if he doesn't click immediately about the features, after that, he will just log himself into the panel and see, "Oh, there's this. I would like to try this feature." So he will upgrade your service because as soon as he discovers new functionalities and thinks it is cool, then he will buy it. The return on investment is very nice.

Which other solutions did I evaluate?

I did not really consider another solution before selecting Cisco Duo.

What other advice do I have?

I haven't noticed an increase in phishing attacks lately. We do have some in our company. We saw an improvement. I think it's always the same as before, but now it's more improved. It's comparable to the following scenario: "We are the police and you did access a website you were not supposed to. This is the company headquarters. Please click here in order to report yourself or you will be fired." I think there's been an improvement in creativity. Not in numbers, but in creativity. Before there was, "You've won an iPhone" or "You've won one million. Please click here." Now they cannot do this anymore. You have to improve your creativity to find a new way to trick the customers.

The pricing for Cisco Duo is really good in the sense that you can try it. There are different packages, and you can choose the one that fits you the most, and you can try it for free for 30 days. So it's a very good catch. And for the price, I think it's worth it. I have not received any bad feedback about the price. I think it's okay.

We were talking about proximity with Bluetooth for Cisco Duo, but now it's been released, which is good because sometimes attackers use MFA fatigue, which means they will bombard you with push requests for everything. But now you need the device you're using to log in to be connected via Bluetooth next to the device you are also using to log yourself in. So that's good. It was one feature I had the idea for, and now I saw that they are doing it. That's excellent.

I would rate this review a 9 out of 10.


    Fabrizo Micucci

Strong authentication has improved secure 2FA and supports flexible identity management

  • February 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

I mainly use Cisco Duo for 2FA and sell that to our customers and the engineering team.

I would like to sell Cisco Duo's end-to-end phishing resistance more to customers.

We are talking with a customer to sell them Cisco Duo Directory to manage user identities.

What is most valuable?

I appreciate the secured push feature of Cisco Duo because you have to choose a number.

I value this feature because it is a security feature that enhances the security of your users, and if you also have geolocation for verified push, that would be even better.

It benefits our company as well as our customers because it is more secure. You can have geolocation or know which network the users are on, so if they do not have a push when they are in the company, but if they are on holidays or traveling somewhere, they have a push verified login, which is much more secure.

What needs improvement?

It is difficult to say how Cisco Duo can be improved. I think it is a good product, but we do not have many customers that use it, so perhaps in marketing, we should bring it more to our customers and show them the use cases for Cisco Duo.

For how long have I used the solution?

I have been using Cisco Duo for one and a half years.

What do I think about the stability of the solution?

The experience my clients have with Cisco Duo is mainly good. There are sometimes some problems, but not major ones, so it is a solid security product.

My clients have never had major problems with Cisco Duo. Everything works fine most of the time, and maybe sometimes there are minor problems, but these are more configuration problems than problems with the product itself.

What do I think about the scalability of the solution?

Cisco Duo is really good for scalability. As with almost every cloud product, the scalability is really good, so it does not matter how many users you have.

How are customer service and support?

I have never had experience with customer service and technical support.

How would you rate customer service and support?

Negative

How was the initial setup?

The setup process for Cisco Duo is quite easy and can be done really quickly. You can have test users, and I think the rollout process is great. They really think about how you deploy it, and it is fair and easily done.

What was our ROI?

The return on investment, like every security product, has to be done. It is much more costly if you do not deploy security in your company.

What's my experience with pricing, setup cost, and licensing?

I think the prices of Cisco Duo are quite fair, but the main problem is that Microsoft Authenticator is built-in with M365, so everyone is switching to that and using it instead of Cisco Duo because it costs extra as a standalone product.

What other advice do I have?

I would give Cisco Duo a rating of 9 out of 10. I do not give it a 10 because I think it is a great product that is easily set up and enhances security. My advice for other companies considering Cisco Duo is to reach out to Netcloud to help. I do not have anything else to add about my experience with Cisco Duo.