We compared Duo Security and Cloudflare Access across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Comparison Results: When comparing Duo Security and Cloudflare Access, Duo Security is praised for its simple setup process, extensive documentation, and seamless integration with other applications. Its most valuable feature is its two-factor authentication and trust establishment for access requests. However, users recommend improvements in terms of compatibility, user management, and technical support. On the other hand, Cloudflare Access is highly regarded for its effortless setup, DDoS protection, and adaptability. It provides protection, customizable rules, and secure solutions. Pricing and support for the free plan are areas of concern.
"Documentation is the most valuable feature, and if you ever have to reach out to them with a question, their support is also fantastic."
"The most valuable feature is the ability for users to connect securely to the office using the VPN."
"It's a lot easier for our end users to connect to our network. You don't have to type in a code. You get push notifications, that's probably the best thing about it. The fewer clicks they have to do to be online, the better it is. They can easily get into the network and do remote work."
"Another feature is the single pane of glass management. That's important for analytics and also for troubleshooting. It means there's one place that you go to at least start the troubleshooting process."
"Multifactor authentication is the most valuable feature."
"They are users who, as mentioned before, utilize RDPAP and MDPAP. It includes functionalities related to finance, specifically in single sign-on."
"It was a simple way of providing two-factor authentication for remote access when we hit the COVID pandemic. It was very easy and quick to get it going."
"The solution is easy to use."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Enables me to work from two locations."
"Cloudflare, in my opinion, was easy to implement."
"The only thing I can think of to improve for tech support is to have a dedicated engineer but then I would get an engineer that has priorities in one area or another and maybe not the scope I need."
"We already have Active Directory enabled in our routers and switches. However, if we could do two-factor authentication, then it could go a long way since no one's getting into them unless you want them to."
"There might be a little slowness, but that could be my connection."
"Duo has some issues that we're trying to work through. For example, if I install it on a WordPress site and another admin needs to log in, they can't because Duo hasn't been set up for them. It doesn't appear that I can add permissions on a user-by-user basis. It's not obvious."
"I would appreciate it if Duo Security could improve its integrations with Windows Hello."
"Integration between Duo Security and FTDs needs improvement. Integrating Next Generation Firewall safety with Duo Security currently requires a proxy agent between Active Directory and the appliance. It's an additional factor that we need to think about. It would be great to have direct integration with FTD so that we don't have to worry about middleware products. For the rest of the Cisco Secure solutions, the APIs need improvement."
"Technical support could be improved. I don't think all support should have to go through an agreement."
"For upgrades, there should be a better notification of when they're coming out. We always have a testing phase, so we need to be ahead of it. It takes us longer before we can upgrade to the newest version."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"They don't have a person to provide support for customers using the solution under their free plan."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"For the topic of improvement, providing some training material is one of my suggestions."
Cisco Duo is ranked 3rd in ZTNA as a Service with 55 reviews while Cloudflare Access is ranked 11th in ZTNA as a Service with 5 reviews. Cisco Duo is rated 8.8, while Cloudflare Access is rated 8.8. The top reviewer of Cisco Duo writes "Helps reduce the risk of a breach and is easy to deploy and onboard". On the other hand, the top reviewer of Cloudflare Access writes "Replaces traditional VPN and enables endpoint exposition ". Cisco Duo is most compared with Microsoft Entra ID, Fortinet FortiAuthenticator, Fortinet FortiToken, Yubico YubiKey and Entrust Identity Enterprise, whereas Cloudflare Access is most compared with Twingate, Prisma Access by Palo Alto Networks, Zscaler Zero Trust Exchange, Auth0 and Akamai Enterprise Application Access. See our Cisco Duo vs. Cloudflare Access report.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.