The world’s leading security key to strong enterprise authentication
Yubico sets new global standards for simple and secure access to computers, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data inside standard servers.
NEW: The YubiKey Bio is here!
The YubiKey Bio Series, built primarily for desktops, offers secure passwordless and second factor logins, and is designed to offer strong biometric authentication options.
Meets the most stringent hardware security requirements with fingerprint templates stored in the secure element on the key
Works out-of-the-box with operating systems and browsers including Windows, macOS, Chrome OS, Linux, Chrome, and Edge
Supports FIDO2/WebAuthn, U2F
Available in both USB-A and USB-C form factors with biometric support
Bridge to Passwordless
Seven Steps to Execute a Smooth Passwordless Implementation
There are as many definitions of passwordless as there are passwords. While it’s widely recognised that there are many benefits to achieving secure account login without the use of passwords – going passwordless can be a confusing topic.
Yubico have have perfectly summarised these easy seven steps which will help every enterprise whether they have a particular focus on their current user environment, their existing authentication processes or their IT staff are ready to cross the bridge to passwordless.
Go Passwordless with Yubico and Microsoft
Experts from Yubico and Microsoft provide an overview of the journey to passwordless, its key benefits, and why it is more secure than typical MFA.
SIM Swap and Mobile Authentication Challenges
Information security professionals should realize they can no longer rely on phone numbers as a secure method of strong authentication.
Let's find the right YubiKey for you
The YubiKey comes in a variety of sizes and shapes to suit all devices and operating systems! This quick quiz will help you discover which YubiKey best suits your needs.
Using the YubiKey with Okta MFA
Okta enables secure identity management and single sign-on to desktop and mobile applications by providing multi-factor authentication. With the YubiKey and Okta’s Adaptive Multi-Factor Authentication (MFA), users are able to securely log in to Okta’s platform via one-time password (OTP) or FIDO Universal 2nd Factor (FIDO U2F) and a YubiKey. Contact one of our product experts to learn how to enroll YubiKeys into the Okta platform.
Accelerate Your Zero Trust Strategy with Strong Authentication
While the concept of Zero Trust has been a topic of conversation for a while, it is only recently that the conversation has shifted to how Zero Trust still means different things to different people. There may be many roads to cutting across the network, identity, and access control, and the array of definitions or ways to get there are dizzying.
Take a look at this whitepaper which will cover how to cut through all the noise when it comes to the Zero Trust framework and how an organisation should trust no individual or thing unless properly verified before being given access to the network and data.
Osterman Research: Cyber Security in Financial Services
The financial services industry is under cyber attack.
It is subjected to the highest rates of attack of any vertical market, the source of one-third of all data breaches, and it is vulnerable due to both negligence and carelessness of employees and other insiders. Compounding the problem is the sudden “work-from-home” phenomenon that began in March 2020.
Yubico has sponsored the Osterman Research: Cyber Security in Financial Services white paper and it provides best practices guidance on defending against and recovering from various types of cyber-attacks and threats, in order to strengthen preparedness and improve resilience across the industry.
Millions of users across over 160 countries use Yubico to secure their stakeholder’s privacy and data.
Google defends against account takeovers and reduces IT costs
Mayank Upadhyay, Director of Security Engineering | Google Inc.
“We believe that by using this token we’ve raised the standard of security for our employees beyond what was commercially available.”
Making security effortless for employees
John “Four” Flynn, Information Security Manager | Facebook Inc.
“Protecting against remote attackers is a constant challenge, because once they gain access, they can move laterally through the organisation.”
Uk residents enjoy secure online access to government services
Marcel Wendy, Chief Technology Officer | GOV.UK
“We are pleased to partner with Yubico, a driving contributor of the FIDO U2F standard, to make this happen.”
Request a demo
Ready when you are! Take a quick demo with one of our experts and learn why millions of people rely on Yubico to securely connect to the technologies that let them do their most important work.