Ironshare

Secure Access with Duo Security

Secure Access with Duo Security protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access.
Duo is engineered to provide a simple, streamlined login experience for every user and application.

Features

  • Multi-Factor Authentication
  • Duo Push notification
  • Verify device trust
  • Cloud managed and delivered
  • Support Security Keys and Tokens
  • Secure Corporate Devices and BYOD
  • Secure Application Access and Single Sign On
  • Features support a Zero Trust Architecture

Benefits

  • Help prevent account compromise & credential attacks
  • Easy deployment of Duo into any environment
  • Verify identity in seconds
  • Cloud Managed solution from a single easy to use dashboard
  • Protect any application on any device
  • User-friendly experience with secure frictionless authentication
  • Simple cloud based licensing subscription model
  • Increase your visibility into the user sign-in
  • Assess & monitor device health

Pricing

£3 to £9 a person a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at information@ironshare.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

9 1 4 9 1 7 5 1 5 8 8 5 5 3 8

Contact

Ironshare Stuart Hare
Telephone: +441217690475
Email: information@ironshare.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The product has different levels of offerings and is part of an end-to-end security portfolio offered by Cisco, the entire range is backed by Cisco Talos global threat intelligence.
Cloud deployment model
Public cloud
Service constraints
None
System requirements
  • Internet Access
  • Supported browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We offer licensing subscription as a standalone purchase. Includes 24x7 Email Support with a 2 hour response target. Additional service levels can be arranged at additional cost. In addition, we offer an optional Managed services which covers the Installation, configuration and deployment of the solution, as well as remote management and monitoring of logs, incident investigation and an easy to understand monthly dashboard report. Service levels for the Managed Service can be tailored to your requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We can do all of the necessary back-end configuration and then advise directly on how best to deploy the solution. This is achieved by direct consultation followed by a documented process.

Additional our managed service means that we can take the strain away from the customer, however if you have staff that would like to take on the day-to-day management then we can also provide online training and documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is provided upon request once the contract has come to an end and will be deleted following sign-off from the customer.
End-of-contract process
When the contract comes to an end all off - boarding tasks will be included in our standard service.

Alternatively if no managed service is taken, the customer can liaise directly with the vendor support.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
API
Yes
What users can and can't do using the API
Duo has a number of Application Programming Interfaces (APIs) that allow customers to perform a variety of related functions without needing to use the dashboard or console. APIs are available only to customers who have purchased the correct package; some APIs require a separate purchase, and some APIs are in limited availability as they undergo testing. Unless otherwise noted, the APIs follow RESTful principles and use standard JSON format for input and output. All APIs require authentication; most use HTTP Basic Authentication with a username and password (generally referred to in Cisco documentation as a key and secret).
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Duo customers support any size of business and can scale from 10 users to 10,000+.

Duo has maintained uptime of greater than 99.99% for more than four years, with a hard service level guarantee backed by SLA. Duo’s servers are hosted across independent PCI DSS, ISO 27001-certified, and SSAE 16-audited service providers with strong physical security.

We provide a high-availability service split across multiple geographic regions, providers and power grids for seamless failover, and our multiple offsite backups of customer data are encrypted.

Analytics

Service usage metrics
Yes
Metrics types
Reporting metrics are including in the platform, to track usage, licensing etc.

High-level monthly dashboard reports can be provided with our managed service.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Cisco

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported upon request.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Duo has maintained uptime of greater than 99.99% for more than four years, with a hard service level guarantee backed by SLA. Duo’s servers are hosted across independent PCI DSS, ISO 27001-certified, and SSAE 16-audited service providers with strong physical security.
Approach to resilience
We provide a high-availability service split across multiple geographic regions, providers and power grids for seamless failover, and our multiple offsite backups of customer data are encrypted.
Outage reporting
Public Dashboard for Service Status & Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
SAML Single Sign On
Access restrictions in management interfaces and support channels
Access can be restricted to admin consoles / dashboards, using role based access control and IP lists.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
SAML Single Sign On

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Cyber Essentials as standard, as well as key processes and procedures from ISO 27001, FIPS Compliance, NIST and NCSC standards.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes and configuration management processes are derived from ITIL V3 standards.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Defined by the vendor of the solution.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Defined by the vendor of the solution.
Incident management type
Supplier-defined controls
Incident management approach
As part of a managed service, incidents are documented and tracked through to resolution via our helpdesk service. Users can report incidents via email & telephone. Reports are provided in PDF dashboard format.

Vendor support processes may differ.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£3 to £9 a person a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
The free trial includes assistance with deployment, support throughout the trial period, and a dashboard report at the end.
Standard trials run for approximately 30 days.
Link to free trial
https://www.ironshare.co.uk/duo-security-free-trial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at information@ironshare.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.