{"id":3632,"date":"2018-11-16T13:44:12","date_gmt":"2018-11-16T10:44:12","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3632"},"modified":"2019-06-05T16:23:17","modified_gmt":"2019-06-05T13:23:17","slug":"duo-vs-protectimus-features","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus-features\/","title":{"rendered":"Duo Security vs Protectimus: Features"},"content":{"rendered":"<p>In <a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus\/\">Duo Security vs Protectimus<\/a>, we touched on all the aspects of Duo and Protectimus two-factor authentication solutions. We examined the technologies these companies use, their methods of delivering one-time passwords, the availability of an API and pre-made plugins for integration, pricing, availability in cloud-based and on-premise forms, and \u2014 briefly \u2014 the features of each solution.<\/p>\n<p>In this article, we describe in greater detail the features available to administrators and users of the Duo and Protectimus multifactor authentication services. You can use this table to navigate the article more easily.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"50%\" height=\"80\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3637\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/11\/duoLogo-web.png\" alt=\"\" width=\"194\" height=\"63\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/11\/duoLogo-web.png 571w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/11\/duoLogo-web-300x97.png 300w\" sizes=\"auto, (max-width: 194px) 100vw, 194px\" \/><\/td>\n<td width=\"50%\" height=\"80\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3638\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/11\/protectimus-logo-300x63.png\" alt=\"\" width=\"298\" height=\"63\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/11\/protectimus-logo-300x63.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2018\/11\/protectimus-logo.png 445w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><a href=\"#Duo User self-service\">User self-service<\/a><\/td>\n<td><a href=\"#Protectimus User self-service\">User self-service<\/a><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><a href=\"#Duo Geographic filters\">Geographic filters<\/a><\/td>\n<td><a href=\"#Protectimus Geographic filters\">Geographic filters<\/a><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><a href=\"#Duo Network- or IP-based access control\">Network- or IP-based access control<\/a><\/td>\n<td><a href=\"#Protectimus Adaptive authentication\">Adaptive authentication<\/a><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><a href=\"#Duo Role-based access policies\">Role-based access policies<\/a><\/td>\n<td><a href=\"#Differentiation and delegation of authority within the system\">Differentiation and delegation of authority within the system<\/a><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><a href=\"#Duo Monitoring and identification of vulnerable devices\">Monitoring and identification of vulnerable devices<\/a><\/td>\n<td><a href=\"#Protectimus Ability to assign different types of tokens to different users\">Ability to assign different types of tokens to different users<\/a><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><\/td>\n<td><a href=\"#Protectimus Time-based filters\">Time-based filters<\/a><\/td>\n<\/tr>\n<tr>\n<td height=\"40\"><\/td>\n<td><a href=\"#Protectimus CWYS (Confirm What You See) data signing functionality\">CWYS (Confirm What You See) data signing functionality<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: center;\"><strong>Duo Security<\/strong><\/h2>\n<p><a name=\"Duo User self-service\"><\/a><br \/>\n<span style=\"color: #808080;\"><em>Note: Nearly all features examined in this section can be activated only with Duo&#8217;s most expensive payment plans, Access and Beyond. Self-service is also available in the Duo MFA basic plan.<\/em><\/span><\/p>\n<h3>User self-service<\/h3>\n<p><a name=\"Duo Geographic filters\"><\/a><br \/>\nUsers can issue and manage tokens themselves. This saves administrators time. Saving administrators time means saving the company money, which is always good.<\/p>\n<h3>Geographic filters<\/h3>\n<p><a name=\"Duo Network- or IP-based access control\"><\/a><br \/>\nThese allow administrators to grant access to a resource only from a specified geographic location. Or, they can deny access from certain countries (for example, North Korea or Russia).<\/p>\n<h3>Network- or IP-based access control<\/h3>\n<p><a name=\"Duo Role-based access policies\"><\/a><br \/>\nThis feature is also referred to as adaptive authentication by Duo. It gives administrators the ability to block access to a resource from anonymous networks (such as Tor). Access can also be allowed or denied from a specific range of IP addresses.<\/p>\n<h3>Role-based access policies<\/h3>\n<p><a name=\"Duo Monitoring and identification of vulnerable devices\"><\/a><br \/>\nThis makes it possible to impose stricter authentication rules for specific users or groups of users, depending on their roles and their levels of access to data. For example, an accountant might be able to choose any authentication method \u2014 SMS, push notifications, or a one-time password from an app \u2014 while a network administrator might be required to use a hardware token exclusively.<\/p>\n<h3>Monitoring and identification of vulnerable devices<\/h3>\n<p>This unique technology allows you to keep tabs on users&#8217; &#8220;device hygiene&#8221; if they have the Duo Mobile app installed. Using this system, you can see how well-protected each device is: find out if biometric authentication and screen lock settings are configured; find out if antivirus is installed; find out what operating system, browsers, and plugins are installed, and whether they&#8217;re up to date; see if the device is personal or company-owned; see if the device has been rooted, etc. An administrator can block access to the system from devices that don&#8217;t meet preset requirements (for example, if no antivirus is installed).<\/p>\n<h2 style=\"text-align: center;\"><strong>Protectimus<\/strong><\/h2>\n<p><a name=\"Protectimus User self-service\"><\/a><br \/>\n<span style=\"color: #808080;\"><em>Note: All features examined in this section are available with all payment plans, including the no-cost Protectimus Free plan.<\/em><\/span><\/p>\n<h3>User self-service<\/h3>\n<p><a name=\"Protectimus Geographic filters\"><\/a><br \/>\nThis feature takes a burden off of the system administrator&#8217;s shoulders, saving the administrator time and the company money. Users can issue and manage their own tokens.<\/p>\n<h3>Geographic filters<\/h3>\n<p><a name=\"Protectimus Time-based filterss\"><\/a><br \/>\nThese allow restricting access to specific countries only. Access from specific countries (Russia, North Korea, etc.) can also be blocked.<\/p>\n<h3>Time-based filters<\/h3>\n<p><a name=\"Protectimus Adaptive authentication\"><\/a><br \/>\nThis feature allows granting access to a resource only at certain times; for example, only during business hours. This approach significantly increases the level of protection against unauthorized account access. It&#8217;s perfect for corporate environments: even if a user leaves their token at work, nobody can access the user&#8217;s account outside of working hours.<\/p>\n<h3>Adaptive authentication<\/h3>\n<p><a name=\"Differentiation and delegation of authority within the system\"><\/a><br \/>\nThis feature may also be called smart identification or user environment analysis. We created it to make things more convenient for users in systems where a certain amount of trust is permissible. Nobody loves typing in one-time passwords, so we devised a way of analyzing the user&#8217;s environment (browser name and version, operating system and language, window size and screen resolution, color depth, presence or absence of Java, plugins, etc.); a one-time password is required only once an established mismatch threshold has been exceeded.<\/p>\n<h3>Differentiation and delegation of authority within the system<\/h3>\n<p>Resources are used to logically group users and easily manage them. Several resources can be created within a single account, and several administrators can be appointed to manage different resources.<\/p>\n<p>Let&#8217;s see how this works in a payment system, for example. There are 2 tasks in a payment system: protecting the end users and protecting the admin panel. For the end users, two-factor authentication should be, first and foremost, convenient. Access to the admin panel must be protected as reliably as possible.<\/p>\n<p>In this case, one resource is created in the Protectimus service for the end users, where they can choose from a variety of <a href=\"https:\/\/www.protectimus.com\/tokens\">tokens<\/a> (they can purchase a <a href=\"https:\/\/www.protectimus.com\/protectimus-two\">hardware token<\/a>, download a <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\">software OTP token<\/a>, or connect to the <a href=\"https:\/\/www.protectimus.com\/protectimus-bot\">Protectimus chatbot<\/a> on any messaging service).<br \/>\n<a name=\"Protectimus Ability to assign different types of tokens to different users\"><\/a><br \/>\nTo protect the accounts of administrators, developers, and support staff, another resource can be created in the same Protectimus account with stricter authentication rules: only hardware tokens can be connected, and time- and location-based filters are set up. This way, you can conveniently manage different groups of users and establish different security requirements for them, based on each group&#8217;s level of access to sensitive data.<\/p>\n<h3>Ability to assign different types of tokens to different users<\/h3>\n<p><a name=\"Protectimus CWYS (Confirm What You See) data signing functionality\"><\/a><br \/>\nAs described above, by assigning different users to different resources, administrators can control the selection of authentication methods available to users. If needed, the administrator can even create and assign a token to each user individually.<\/p>\n<h3>CWYS (Confirm What You See) data signing functionality<\/h3>\n<p>CWYS functionality protects against <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">man-in-the-middle attacks<\/a>, banking Trojans, injection attacks, and other kinds of malware designed to intercept one-time passwords. One-time passwords are generated based on data from the user&#8217;s current operation. For example, when transferring funds, the amount, currency, and user data are used to generate an OTP. This one-time password can only be used to confirm that particular operation being performed by the user. Even if an attacker intercepts such a password, it won&#8217;t work to confirm an illegal transaction. You can read more about how CWYS works <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">here<\/a>.<\/p>\n<h2 style=\"text-align: center;\"><strong>Conclusions<\/strong><\/h2>\n<p>Many similar functions are available in Duo&#8217;s and Protectimus&#8217;s strong authentication services: user self-service, geographic filters, adaptive authentication, and the ability to impose custom authentication requirements for users with different access levels.<\/p>\n<p>But there are differences. The specifics of Duo Security&#8217;s 2FA solution, where the main means of delivering OTPs is through a mobile application, became a reason for them to develop a system to monitor user devices and identify problems in protecting these devices. Protectimus 2FA service does not have this feature. However, it does include CWYS data signing \u2014 invaluable in payment and banking services \u2014 and time-based filters that allow you to boost the effectiveness of your corporate infrastructure protection several times over.<\/p>\n<table>\n<tbody>\n<tr>\n<td height=\"40\">\n<h3><strong>Features<\/strong><\/h3>\n<\/td>\n<td style=\"text-align: center;\" width=\"150\">\n<h3><strong>Duo Security<\/strong><\/h3>\n<\/td>\n<td style=\"text-align: center;\" width=\"150\">\n<h3><strong>Protectimus<\/strong><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Self-service<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Geographic filters<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Time-based filters<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">no<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Adaptive authentication<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Role-based access policies<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Monitoring and identification of vulnerable devices<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">no<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"40\">Data signing<\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #60c5e9;\">no<\/span><\/strong><\/td>\n<td style=\"text-align: center;\"><strong><span style=\"color: #6dbf50;\">yes<\/span><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: center;\"><strong>Read more<\/strong><\/h2>\n<ul>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus\/\">Duo Security vs Protectimus<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus-authentication-methods\/\">Duo Security vs Protectimus: Authentication Methods<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-does-2-factor-authentication-work\/\">How does 2-factor authentication work?<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/the-evolution-of-two-step-authentication-means\/\">The Evolution of Two-Step Authentication<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/mobile-authentication-pros-and-cons\/\">Mobile Authentication Pros and Cons<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/protectimus-new-otp-tokens\/\">Protectimus New OTP Tokens<\/a><\/li>\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/why-universities-choose-hardware-tokens\/\">Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens<\/a><\/li>\n<\/ul>\n<p><em>Image and logo source:&nbsp;<a href=\"https:\/\/duo.com\/\" target=\"_blank\" rel=\"noopener nofollow\">duo.com<\/a><\/em><\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>In Duo Security vs Protectimus, we touched on all the aspects of Duo and Protectimus two-factor authentication solutions. We examined the technologies these companies use, their methods of delivering one-time passwords, the availability of an API and pre-made plugins for integration, pricing, availability in cloud-based and on-premise forms, and \u2014 briefly \u2014 the features of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15],"tags":[16,120,194,99],"class_list":["post-3632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","tag-2fa","tag-multifactor-authentication","tag-protectimus-en","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3632"}],"version-history":[{"count":20,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3632\/revisions"}],"predecessor-version":[{"id":4247,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3632\/revisions\/4247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4246"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}