Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:30 AM
Connect Directly

Exclusive: Cisco, Duo Execs Share Plans for the Future

Cisco's Gee Rittenhouse and Duo's Dug Song offer ideas and goals for the merged companies as Duo folds under the Cisco umbrella.

Cisco Systems first announced its intent to acquire Duo Security, the cloud-based multifactor authentication (MFA) startup, for $2.35 billion in early August. Since then, the two companies have been finalizing the deal's close and determining how to integrate Duo's tech into Cisco's portfolio.

The Duo acquisition, which closes today, is one of Cisco's largest security deals to date and its third largest deal in the last five years. To learn more about what drove the partnership and where their teams are headed, we asked the two people leading them: Duo cofounder and CEO Dug Song, and Gee Rittenhouse, head of Cisco's newly formed Security Business Group, the division under which Duo operates.

"We want to have a portfolio that covers all of the major threat vectors," says Rittenhouse. "There was an emerging perimeter around identity that we were lacking."

Duo brings more to the table than MFA tech alone, he continues, noting that Cisco was already working on policy and identity in network security. The acquisition gives Cisco an opportunity to leverage Duo's technology and extend its network security posture into cloud-based or on-premise applications, coupling it with the policy and identity in its networking business.

Right now, there are several ways Duo could play a role within Cisco's portfolio and it's still ironing out the details, Rittenhouse explains. He says Duo will continue to focus on its business and execute within Cisco, and he hopes Cisco will help broaden Duo's reach through scale and access to a larger market.

The post-acquisition weeks have been "business as usual" at Duo, says Song, and he's looking forward to the company having a greater influence as part of Cisco. "The reality is, we are looking at a larger impact we hope to have," he says. Duo already supports a number of Cisco products, Song notes, but he hopes the company will have a greater inpact as part of its larger portfolio.

Duo plans to use its additional scale to reach a growing number of people working on mobile and multi-cloud environments. "We're taking a user-centric approach as more and more attackers are going after users," he says.

Cisco expects this latest acquisition will help it enter new areas of security, specifically on the application side, and the company plans to continue integrating security throughout its product portfolio.

"If you take a look at multifactor authentication … this opens up an entirely new market for Cisco, and one that we're very excited to jump into," he adds, emphasizing an industry-wide need to establish trust around users and devices. In the app security space, Rittenhouse views Duo as a "huge component" of being able to protect applications in a simple way.

(From left to right: Dug Song, Duo cofounder and CEO, Gee Rittenhouse, SVP and GM of Cisco Security, and Jon Oberheide, Duo cofounder and CTO)

(From left to right: Dug Song, Duo cofounder and CEO, Gee Rittenhouse, SVP and GM of Cisco Security, and Jon Oberheide, Duo cofounder and CTO)

Simplicity, he says, is a critical part of security but difficult to achieve.

"I think identity has always been important; one of the issues that was hard in terms of implementation was the complexity," he explains. Multifactor keys like tokens or fobs interfere with the user experience. Duo's approach, he adds, shows how simplicity makes MFA a priority. Duo's approach, Rittenhouse says, has sown a path for the industry and demonstrated how if you create a strong user experience for MFA, it will rise to the importance that it deserves.

"We have to design security for people," Song continues, and build technologies in a way that's both protective and easy to use. "We are building consumer-grade technologies that are enterprise worthy."

This simplicity, Rittenhouse says, is a priority going forward as Cisco works on the front end of its security portfolio. Up until this point, it has been integrating the back end with intelligence from Cisco Talos, the firm's research division.

"There's a huge emphasis, going forward, about putting together very simple product management – a single pane of glass," so operations teams have a simpler end-to-end view of security alerts.

This doesn't mean customers will be required to swap existing MFA tech for Duo's, says Rittenhouse. With respect to MFA, Cisco is an open platform and customers can buy the product in its entirety or purchase it in parts and integrate their preferred authentication tool. It's common for security teams to want to bring in other vendors, Rittenhouse notes. 

"Don't expect to see Duo mandated as multi-factor authentication in Cisco's portfolio," he says.

While current and new customers may have their pick of authentication tools, there is an added convenience to have Duo's tech integrated from the start. As more of the industry has to deal with the complexity of integrating new enterprise technologies he adds, there is a value proposition when vendors pre-integrate and make it easier to use straight out of the box.

But will Duo's technology still carry the Duo label? That's something they're still working on.

"We haven't worked through that at this point," says Rittenhouse. Duo as a company will become Cisco as a company, he continues, but they have not yet determined how to label the actual product. It's a key question – Duo, after all, has built a strong identity in the industry. How does the company expect to maintain that identity as it's folded under the Cisco umbrella?

Culture is an essential part of Duo, says Song. Hiring for cultural fit and cultural contribution, developing and growing that culture will continue to be important under Cisco.

"Coming into Cisco we see something similar," he continues. Duo plans to maintain its same values around inclusion, diversity, continuing to represent multiple perspectives. As part of Cisco, Song explains, Duo will be able to build on parts of its culture through new initiatives it couldn't do before – corporate giving, for example, or tuition for continuing education.

Its focus, of course, will continue to be "easy, effective, trustworthy security" as it continues to grow the technical partnership Duo and Cisco have had for years.

Related Content:




Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.