We performed a comparison between Cisco Duo and Nok Nok Labs based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems."Multifactor authentication and secure two-factor authentication are the most valuable features. It's been around for a while, but now it's becoming an enforced behavior as opposed to something that you used to do as optional."
"The most valuable aspect is the authentication and the SSO."
"The ability for users to authenticate via phone, from any random phone number, has been very helpful for managing a distributed workforce. Using it across a distributed network for securing access to our applications is big for us."
"The flexibility is the most valuable feature. We use it for the app on the phone. When we're at different locations, the phone is usually there, so we can use that. It has just been a very flexible option."
"Cisco is the perfect product for our current size, and I don't think we'll have problems with scalability as we grow."
"Duo has allowed us to add an additional layer of security to our organization and to establish trust for every access request and secures our environment."
"The integration with Azure Active Directory and the AWS cloud is amazing, as most products nowadays require the creation of a customized integration. With Duo Security, it was more like native integration, and it took me five minutes to register."
"We were considering purchasing other products, like AMP for Endpoints, and it was not properly integrated with the firewall function. It might be better now with SecureX."
"The technical support is quite good."
"Duo Security should better organize its tile feature to organize applications better."
"Most of my colleagues from other companies use the Microsoft MFA solution because it's included in Office 365. Few people are considering Cisco Duo. That's the primary problem in our area. It's a solution mostly adopted by Cisco users."
"While two-factor authentication with mobile devices provides a high level of security, it's still not foolproof, as someone could potentially steal your phone. It would be beneficial to have information about the authentication location."
"We first deployed Duo Security for our company with the VPN, and afterward, about a year later, we implemented it for a customer of ours where we offered infrastructure as a service. When I tried to establish a VPN connection through Duo Security, it did not function well on that version, which was the latest one at the time. So, I had to make a copy of the machine and then implement Duo Security with the VPN because it did not function well with the newer version."
"The technical engineers in the first line of support should improve their knowledge."
"I'd like to see it integrated into other applications. I know there are some integrations, but I haven't been able to explore that any further."
"Reducing or eliminating the "telephony credits" system used by Duo would be great."
"The pain point for us at one point was the Duo Authentication Proxy since we're on-premises and not in the cloud. We had to have a proxy machine that's in our DMZ to talk to Duo for us. The configuration of that was a little complicated."
"There's nothing wrong with the solution that we can see. However, maybe they could improve slightly by incorporating decentralized identity blockchain models into their solution."
Earn 20 points
Cisco Duo is ranked 2nd in Authentication Systems with 55 reviews while Nok Nok Labs is ranked 31st in Authentication Systems. Cisco Duo is rated 8.8, while Nok Nok Labs is rated 8.0. The top reviewer of Cisco Duo writes "Helps reduce the risk of a breach and is easy to deploy and onboard". On the other hand, the top reviewer of Nok Nok Labs writes "Easy to use, reliable, and offers a straightforward setup". Cisco Duo is most compared with Microsoft Entra ID, Fortinet FortiAuthenticator, Fortinet FortiToken, Yubico YubiKey and UserLock, whereas Nok Nok Labs is most compared with OneSpan DIGIPASS and Ping Identity Platform.
See our list of best Authentication Systems vendors.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.