Ironshare
Secure Access with Duo Security
Secure Access with Duo Security protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access.
Duo is engineered to provide a simple, streamlined login experience for every user and application.
Features
- Multi-Factor Authentication
- Duo Push notification
- Verify device trust
- Cloud managed and delivered
- Support Security Keys and Tokens
- Secure Corporate Devices and BYOD
- Secure Application Access and Single Sign On
- Features support a Zero Trust Architecture
Benefits
- Help prevent account compromise & credential attacks
- Easy deployment of Duo into any environment
- Verify identity in seconds
- Cloud Managed solution from a single easy to use dashboard
- Protect any application on any device
- User-friendly experience with secure frictionless authentication
- Simple cloud based licensing subscription model
- Increase your visibility into the user sign-in
- Assess & monitor device health
Pricing
£3 to £9 a person a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at information@ironshare.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 12
Service ID
9 1 4 9 1 7 5 1 5 8 8 5 5 3 8
Contact
Ironshare
Stuart Hare
Telephone: +441217690475
Email: information@ironshare.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The product has different levels of offerings and is part of an end-to-end security portfolio offered by Cisco, the entire range is backed by Cisco Talos global threat intelligence.
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Internet Access
- Supported browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We offer licensing subscription as a standalone purchase. Includes 24x7 Email Support with a 2 hour response target. Additional service levels can be arranged at additional cost. In addition, we offer an optional Managed services which covers the Installation, configuration and deployment of the solution, as well as remote management and monitoring of logs, incident investigation and an easy to understand monthly dashboard report. Service levels for the Managed Service can be tailored to your requirements.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We can do all of the necessary back-end configuration and then advise directly on how best to deploy the solution. This is achieved by direct consultation followed by a documented process.
Additional our managed service means that we can take the strain away from the customer, however if you have staff that would like to take on the day-to-day management then we can also provide online training and documentation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is provided upon request once the contract has come to an end and will be deleted following sign-off from the customer.
- End-of-contract process
-
When the contract comes to an end all off - boarding tasks will be included in our standard service.
Alternatively if no managed service is taken, the customer can liaise directly with the vendor support.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Duo has a number of Application Programming Interfaces (APIs) that allow customers to perform a variety of related functions without needing to use the dashboard or console. APIs are available only to customers who have purchased the correct package; some APIs require a separate purchase, and some APIs are in limited availability as they undergo testing. Unless otherwise noted, the APIs follow RESTful principles and use standard JSON format for input and output. All APIs require authentication; most use HTTP Basic Authentication with a username and password (generally referred to in Cisco documentation as a key and secret).
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
-
Duo customers support any size of business and can scale from 10 users to 10,000+.
Duo has maintained uptime of greater than 99.99% for more than four years, with a hard service level guarantee backed by SLA. Duo’s servers are hosted across independent PCI DSS, ISO 27001-certified, and SSAE 16-audited service providers with strong physical security.
We provide a high-availability service split across multiple geographic regions, providers and power grids for seamless failover, and our multiple offsite backups of customer data are encrypted.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Reporting metrics are including in the platform, to track usage, licensing etc.
High-level monthly dashboard reports can be provided with our managed service. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Cisco
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported upon request.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Duo has maintained uptime of greater than 99.99% for more than four years, with a hard service level guarantee backed by SLA. Duo’s servers are hosted across independent PCI DSS, ISO 27001-certified, and SSAE 16-audited service providers with strong physical security.
- Approach to resilience
- We provide a high-availability service split across multiple geographic regions, providers and power grids for seamless failover, and our multiple offsite backups of customer data are encrypted.
- Outage reporting
- Public Dashboard for Service Status & Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- SAML Single Sign On
- Access restrictions in management interfaces and support channels
- Access can be restricted to admin consoles / dashboards, using role based access control and IP lists.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- SAML Single Sign On
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Cyber Essentials as standard, as well as key processes and procedures from ISO 27001, FIPS Compliance, NIST and NCSC standards.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes and configuration management processes are derived from ITIL V3 standards.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Defined by the vendor of the solution.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Defined by the vendor of the solution.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
As part of a managed service, incidents are documented and tracked through to resolution via our helpdesk service. Users can report incidents via email & telephone. Reports are provided in PDF dashboard format.
Vendor support processes may differ.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £3 to £9 a person a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
The free trial includes assistance with deployment, support throughout the trial period, and a dashboard report at the end.
Standard trials run for approximately 30 days. - Link to free trial
- https://www.ironshare.co.uk/duo-security-free-trial/
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at information@ironshare.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.