Authy vs Duo Security


6
Authy
Strong Authentication You'll Actually Enjoy. We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.
11
Duo Security
Two-factor authentication done right. Duo Security lets your users use their mobile phones to secure their logins, protecting your company from account takeover. Duo’s solution is cloud-based, which means there's no software to install, and no server to set up. Our patented technology and drop-in integrations enable you to seamlessly integrate Duo into your existing application login workflow.
Face to face in the news:


2015 - Authy makes 2-factor authentication as painless as possible. Duo Security is in panic


Authy, the two-factor authentication startup, unveiled its newest product - OneTouch authentication service that makes two-factor authentication about as painless as possible. Instead of having to enter a code that’s generated on your phone into a web form, OneTouch simply sends a push notification to your phone, asks you to confirm that you want to sign in to the site that sent the notification and you’re in. That’s about as frictionless as two-factor authentication gets. The idea here is that by entering the code into the website, you basically prove that you have access to the phone, too, so you could just as well take this to the next level and use the phone to authenticate yourself.

2015 - Duo Security unveiled new service to protect enterprises against data breaches to keep up competition with Authy


Duo Security, the two-factor authentication startup is releasing a new product, called Duo Platform, which will enable IT teams to create policies and automate enforcement of their networks while also tracking the security profiles of devices trying to access their systems. Duo’s new Platform product takes advantage of its prior learnings and extends them deeper into customer networks. It enables IT administrators to create more granular rules around who can access its applications and under what conditions. It provides real-time insights into devices trying to connect to their applications and can block data breaches as they’re happening by detecting access-related security threats.