SECURE HARDWARE AUTHENTICATION

Balancing security and usability has always been a challenge.
Yubico

YubiKey—your ubiquitous key

Balancing security and usability has always been a challenge. Software authentication, including passwords, SMS and mobile apps are all increasingly vulnerable to malware and hackers. Historically, the more secure hardware authentication solutions have been difficult to use and deploy. The YubiKey from Yubico changes this. Yubico was founded to set new global authentication standards, enabling one single security key to access computers, phones, networks and online services—all in a simple touch. Yubico named the invention the YubiKey—your ubiquitous key.

HOW THE YUBIKEY WORKS

  • Register your YubiKey
  • Insert your YubiKey into a USB port and tap to verify you are human
  • For NFC enabled Android 'phone, just tap against the device to authenticate
The YubiKey works with hundreds of enterprise, developer and consumer applications, out of the box with no client software. Combined with leading password managers, social log in and enterprise SSO systems, the YubiKey enables secure access to millions of online services.

YUBIKEY BENEFITS

  • The security key combines hardware based authentication, public key cryptography and the U2F and FID02 protocols to eliminate account takeovers.
  • The keys work out of the box with Gmail, Facebook and hundreds more and are waterproof and crush resistant.

Different keys are available:

  • The FIPS Series keys which meet the NIST SP800-63B guidelines making them suitable for government and regulated industries.
  • The YubiKey for Lightning
  • YubiKey 5 Series.

For more details about YubiKeys and to find out which one is right for you, please contact your account manager.

Alternatively, follow the link to assess your capabilities. You will get an instant performance dashboard and
can also request an executive report.

WHY SHOULD YOU IMPLEMENT yubikey today?