Compare Duo Security vs. Google Cloud Platform Cloud Identity-Aware Proxy

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Fortinet, Ping Identity, Cisco and others in Authentication Systems. Updated: November 2020.
448,775 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"By deploying Duo, we have virtually eliminated the risk of direct deposit redirection as a result of credentials that have been compromised via phishing.""The most valuable aspect is the authentication and the SSO.""It is a good solution for hybrid environments and VPN."

More Duo Security Pros »

"The app provides ready-made services that we can talk to without issue.""There is a lot of flexibility and a lot of control if you use this efficiently.""There is a certain accessibility feature that I can set using a cloud identity, which is really valuable to us.""We do not need to maintain the hardware.""It is totally awesome in terms of scalability. Its scalability was the main reason for moving to Google Cloud. It also comes with a lot of features. We are satisfied with the features it has."

More Google Cloud Platform Cloud Identity-Aware Proxy Pros »

Cons
"Reducing or eliminating the "telephony credits" system used by Duo would be great.""Removing the need for a password would be a positive change as well as the ability to cover all the different enterprise applications. They don't have coverage for everything.""The dashboard needs to be improved.""Certain customers can not use this product because it is cloud-based."

More Duo Security Cons »

"The initial setup was quite complex.""The setup could be more user-friendly.""the documentation could be a bit better in terms of what is presented on the screen versus what actually happens.""I think this product needs to shift the focus from our software, our solution, like social media analytics to our customers; not maintenance in the hardware.""We have some challenges related to purging the data. We get a lot of data on a daily basis that has to be refreshed on the site, but we are seeing some challenges with that. They can also include some third-party integration. We have one Akamai dependency. If they can come up with some API to talk to Akamai, it would be good."

More Google Cloud Platform Cloud Identity-Aware Proxy Cons »

Pricing and Cost Advice
"During testing we are allowed a certain number of licenses for free."

More Duo Security Pricing and Cost Advice »

"I think that the cost is metered based on the data, but I don't have the details.""Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us."

More Google Cloud Platform Cloud Identity-Aware Proxy Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Authentication Systems solutions are best for your needs.
448,775 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: I think that the cost is metered based on the data, but I don't have the details.
Top Answer: I think this product needs to shift the focus from our software, our solution, like social media analytics to our customers; not maintenance in the hardware. We focus on our business for the… more »
Ranking
3rd
Views
4,902
Comparisons
4,087
Reviews
3
Average Words per Review
387
Avg. Rating
7.3
1st
out of 15 in ZTNA
Views
239
Comparisons
112
Reviews
5
Average Words per Review
538
Avg. Rating
8.0
Popular Comparisons
Compared 22% of the time.
Compared 18% of the time.
Also Known As
GCP Cloud IAP, Google Cloud Platform Cloud IAP, Cloud Identity-Aware Proxy
Learn
Cisco
Google
Overview
Cloud-based user authentication vendor: authenticate with your phone, Duo mobile app, landline, or tokens with or without an internet connection

Google’s mission is to organize the world‘s information and make it universally accessible and useful.

Since our founding in 1998, Google has grown by leaps and bounds. From offering search in a single language we now offer dozens of products and services—including various forms of advertising and web applications for all kinds of tasks—in scores of languages. And starting from two computer science students in a university dorm room, we now have thousands of employees and offices around the world. A lot has changed since the first Google search engine appeared. But some things haven’t changed: our dedication to our users and our belief in the possibilities of the Internet itself.

Offer
Learn more about Duo Security
Learn more about Google Cloud Platform Cloud Identity-Aware Proxy
Sample Customers
Threadless, Yelp, Etsy, Eventbrite
Information Not Available
Top Industries
VISITORS READING REVIEWS
Comms Service Provider29%
Computer Software Company26%
Media Company6%
Retailer5%
No Data Available
Company Size
No Data Available
REVIEWERS
Small Business43%
Midsize Enterprise14%
Large Enterprise43%
Find out what your peers are saying about Fortinet, Ping Identity, Cisco and others in Authentication Systems. Updated: November 2020.
448,775 professionals have used our research since 2012.

Duo Security is ranked 3rd in Authentication Systems with 3 reviews while Google Cloud Platform Cloud Identity-Aware Proxy is ranked 1st in ZTNA with 5 reviews. Duo Security is rated 7.4, while Google Cloud Platform Cloud Identity-Aware Proxy is rated 8.0. The top reviewer of Duo Security writes "Hybrid architecture integration make this product useful but the dashboard needs improvement". On the other hand, the top reviewer of Google Cloud Platform Cloud Identity-Aware Proxy writes "Multi-source system centralized in one location for efficient data transformation". Duo Security is most compared with Yubico YubiKey, Fortinet FortiToken, Fortinet FortiAuthenticator, RSA Authentication Manager and SafeNet Authentication Manager, whereas Google Cloud Platform Cloud Identity-Aware Proxy is most compared with Zscaler Private Access, Cloudflare Access and Okta Workforce Identity.

See our list of .

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.