1、Guide Cisco Public 2023 Cisco and/or its affiliates.All rights reserved.Cisco ConfidentialThe 2024 Duo Trusted Access Report2 2024 Cisco and/or its affiliates.All rights reserved.Trusted Access Report LegendStart of sectionPoint of interestSection continuesAdditonal InformationEnd of sectionTable of
2、 contentsThe New Frontier of Access Management and Identity SecurityMethodologyKey FindingsBillions of AuthenticationsStronger Auth Methods Show Upward TrendsReturn-to-office is the New Hybrid Work RealityFutureproofing Against AttackersAttack Surface IncreaseThe Continuing Rise in Global MFA UsageI
3、dentity is the New PerimeterThe Talos PerspectiveEstablishing Device TrustA Diverse Device EnvironmentDevice Visibility:Protecting What You Cant SeeAuthentication with Out-of-Date SoftwarePowerful Policy ControlsLearning From When Authentications FailBenefits of Strong Device-Based PoliciesTop 3 Pol
4、icy Groups to Reduce Security DebtClosing WordsThe Future of Identity SecurityContext is the New MFARecommendations3557810121414171819192324272729303434353601020304+The 2024 Duo Trusted Access Report 3 2024 Cisco and/or its affiliates.All rights reserved.The New Frontier of Access Management and Ide
5、ntity SecurityIn exploring the future,were often drawn to predicting the unknown.Our quest for answers is unending,and we rely heavily on data to guide our predictions.Organizations today navigate a treacherous digital landscape where the motives of attackers are as varied as their methods ranging f
6、rom financial gains,cyber espionage,and disruption to reputation damage to cyber warfare.Concurrently,these organizations also manage various internal complexities,from the intricacies of their IT stacks to dispersed hybrid workforces and a great variety of devices accessing their systems and applic