Try our new research platform with insights from 80,000+ expert users

Cisco Duo vs Cloudflare One comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 12, 2024
 

Categories and Ranking

iboss
Sponsored
Ranking in ZTNA as a Service
12th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (13th), Internet Security (4th), Web Content Filtering (4th), Cloud Access Security Brokers (CASB) (8th), Secure Access Service Edge (SASE) (10th)
Cisco Duo
Ranking in ZTNA as a Service
6th
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
58
Ranking in other categories
Single Sign-On (SSO) (3rd), Authentication Systems (2nd), Cisco Security Portfolio (6th), Multi-Factor Authentication (MFA) (1st)
Cloudflare One
Ranking in ZTNA as a Service
3rd
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
19
Ranking in other categories
Email Security (13th), Secure Web Gateways (SWG) (8th), Data Loss Prevention (DLP) (7th), Cloud Access Security Brokers (CASB) (7th), Distributed Denial-of-Service (DDoS) Protection (5th), Access Management (5th), Bot Management (3rd), ZTNA (2nd), Secure Access Service Edge (SASE) (7th), Remote Browser Isolation (RBI) (2nd)
 

Featured Reviews

Jack Hamm - PeerSpot reviewer
We experienced benefits immediately but the report generation is lagging
iboss excels on the networking side but lags slightly behind competitors like Zscaler and Netskope in terms of security feature parity. I'd like to see them accelerate development on the security side, particularly around data loss prevention. Using iboss for DLP instead of traditional endpoint solutions is preferable, but its current feature set requires some clunky workarounds. I'd also like to see better integration of DLP into the platform. Additionally, while it's improving, reporting can be slow at times. This is problematic when generating reports for executives who expect them immediately. I'd like to see further improvements in reporting speed and efficiency.
RyanDeppe - PeerSpot reviewer
Helps reduce the risk of a breach and is easy to deploy and onboard
For our customers, Duo Security is a significant advantage because it provides them with a straightforward method to implement MFA across their entire environment. Moreover, once we delve into the more advanced features of Duo Security, it enables us as a partner to engage in ongoing discussions regarding security strategies with our customers. Initially, we may only introduce them to MFA during the onboarding process. However, as their security strategy evolves, we can leverage Duo to perform additional tasks such as risk-based assessments and deployments, thereby assisting in the development of their security measures. Duo Security helps secure our infrastructure. It serves as our gateway layer of protection, allowing us to understand who is logging in and why. We conduct risk-based assessments on each user to determine whether their actions are appropriate or not. Duo Security is not a comprehensive security solution, but it is undoubtedly a crucial component, a critical layer of security. This aspect resonates with our customers consistently. Their ability to reduce the risk of a breach is of utmost importance. It serves as the primary line of defense. Currently, credential gathering and leaks are widespread in the market. By implementing an MFA solution like Duo Security, we can effectively prevent these issues. When we put a stop to credential harvesting, it becomes much harder for attackers to infiltrate and navigate our network. Therefore, Duo Security acts as an excellent first line of defense. User authentication and device verification are the methods through which we envision our customers navigating in order to prevent identity-based attacks. Initially, when we employ Duo Security, it is a straightforward implementation of multi-factor authentication. As we progress, we enhance security measures by incorporating device risk assessment and potentially even regional assessment. This includes considerations such as whether the login is being attempted from a specific IP address. These gradual enhancements contribute to the establishment of an additional layer of protection. Thus, it is not necessary to implement a completely disruptive strategy right from the start. Instead, it is possible to gradually adopt and integrate this approach, following a crawl, walk, or run methodology. The Duo Security self-service portal helps free up our customers' IT staff time, allowing them to focus on other projects. As a Cisco partner, we have received feedback from our customers that the portal is highly interactive, enabling them to easily navigate and resolve issues. After setting up their Duo environment, we rarely receive callbacks for assistance, as the portal is intuitive and empowers users to handle everything they need on their own. The appealing aspect of Duo Security is its ability to establish trust for every access request, regardless of its origin. It is a cloud-based solution with excellent API integrations. It doesn't matter where or how a user logs in; Duo will be there to protect the user, whether it's through MFA, risk assessment, or similar methods. It is extremely beneficial to our customers that Duo Security considers all resources as external. Our customers frequently inquire about a zero-trust model, and this is a key component of it. Unfortunately, I would love to say that there is a simple solution for zero trust where we can just deploy this solution and be done with it. But that's not the case. It requires a layered approach, and that's what we convey to our customers. Duo Security is definitely a part of that. Duo Security has helped improve our customers' cybersecurity resilience. Internally, it protects our users from accessing sales operations-based environments. Additionally, our customers use it regularly to protect business-critical applications.
Leandro Soares Costa - PeerSpot reviewer
Replaces traditional VPN and enables endpoint exposition
It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"Its initial setup was straightforward."
"Technical support is pretty sharp and very responsive."
"The multi-factor authentication process and the geo-locking features are great."
"The two-factor login is great. I receive a message and just have to press okay."
"Since Duo Security provides a single place to log in for our SaaS applications, we don't have to manage user accounts and remember passwords for each specific application."
"Cisco is the perfect product for our current size, and I don't think we'll have problems with scalability as we grow."
"Regarding the valuable features, I would say that Duo Security is easy to use, has speed, and is dependable."
"It's pretty easy for users to figure it out."
"I love Duo Security's push notifications. It's simple, fast, and secure. From the user's perspective, the solution is seamless. The security aspect is great."
"It has definitely reduced embedding. We found a lot of problems with attackers being able to compromise accounts. Now, when they try to access accounts, they are not able to do so because there is an added layer of protection. Once we know that a username and password are compromised, we just reset the password to protect the company."
"Cloudflare is by far the most effective solution that I have come across."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"This solution is easy to understand and easy to configure."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"The blocking feature is very good."
"It will take the blow rather than our applications should an attack occur."
 

Cons

"To scale up, a new iboss Node Blade Chassis must be purchased."
"The reporting feature needs improvement."
"Its pricing could be better."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"It already integrates with lots of products, but it can integrate with more products. There should be easy integration with Cisco products because sometimes, it can be quite complicated."
"We already have Active Directory enabled in our routers and switches. However, if we could do two-factor authentication, then it could go a long way since no one's getting into them unless you want them to."
"Reducing or eliminating the "telephony credits" system used by Duo would be great."
"The product price needs improvement."
"They could just continue to add more integrations."
"Removing the need for a password would be a positive change as well as the ability to cover all the different enterprise applications. They don't have coverage for everything."
"Cisco can further enhance the integrations, as they possess exceptional integrations with various providers' products and feature sets."
"Duo Security could improve by being more compatible with other vendors."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"They don't have a person to provide support for customers using the solution under their free plan."
"Cloudflare DDoS has poor technical support."
"Operating and tuning the product is difficult."
"Our customers no longer use Cloudflare because its service is subpar."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"Our subscription plan for the solution has a limitation of bot signatures."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"It is probably in line with other solutions, but I do not deal with the financial side."
"The overall pricing for iboss is very competitive and transparent."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The pricing is pretty competitive. It's pretty cheap. Anybody can adopt it."
"Their pricing model is a little bit weird. Currently, there is no price advantage in signing up for yearly contracts. There are no additional costs to the standard licensing costs."
"Cisco has the most expensive products because market leaders tend to charge a lot."
"I rate the product pricing a seven out of ten."
"Its price is reasonable. It is not highly expensive."
"It has a fair pricing model. I know they have different tiers, but it would be nice to have different types of licenses for certain groups of users in our organization. That way, we wouldn't have to lump everybody into one group. That would be also one complaint."
"I haven't seen it in a while, but it's at par with everything else licensing-wise."
"I am not aware of the pricing. There are two departments, and I don't have any information about them."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution is not that expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The solution's pricing lacks transparency."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"The prices are slightly expensive."
report
Use our free recommendation engine to learn which ZTNA as a Service solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
25%
Manufacturing Company
8%
Government
7%
Financial Services Firm
6%
Computer Software Company
17%
Financial Services Firm
9%
Comms Service Provider
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
How does Duo Security compare with Microsoft Authenticator?
We switched to Duo Security for identity verification. We’d been using a competitor but got the chance to evaluate Du...
What do you like most about Duo Security?
They are users who, as mentioned before, utilize RDPAP and MDPAP. It includes functionalities related to finance, spe...
What is your experience regarding pricing and costs for Duo Security?
I would rate the pricing of Cisco Duo as a seven on a scale of one to ten, which means it is quite expensive.
What do you like most about Cloudflare Access?
The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good.
What is your experience regarding pricing and costs for Cloudflare Access?
The price of Cloudflare Access is the same as compared to Akamai, but I get better performance from Cloudflare. My co...
What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
 

Also Known As

iBoss Cloud Platform
Duo Security
Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
23andMe
Find out what your peers are saying about Cisco Duo vs. Cloudflare One and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.