Please fill out this form to download your file

X

Hardware Authentication

Hardware Authentication/Yubikey-CyberWhite

Introducing Yubico

Yubico, a creator of global authentication standards and inventor of YubiKey, provides secure access to online accounts and networks, making the internet safer for everyone.

As the inventor of the YubiKey, Yubico makes secure login easy and available for everyone. The company has been a leader in setting global standards for secure access to computers, mobile devices, and more. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F), and open authentication standards.

Download the Yubico Brochure

Phishing-Resistant MFA

YubiKeys are the gold standard for phishing-resistant multi-factor authentication (MFA), enabling a single device to work across hundreds of consumer and enterprise applications and services.

Phishing attacks and account takeovers are on the rise, yet not all types of multi-factor authentication (MFA) are up to the task of preventing modern phishing attacks. Similar to usernames and passwords, mobile-based authentication such as SMS, one-time passcode (OTP), and push notifications also rely on ‘shared secrets’ that can be breached by phishing, malware, SIM swapping, and man-in-the-middle (MiTM) attacks.

The YubiKey is a hardware security key offering phishing-resistant MFA to stop account takeovers, reduce costs, and drive employee productivity. YubiKeys are the gold standard for phishing-resistant multi-factor authentication (MFA), enabling a single device to work across hundreds of consumer and enterprise applications and services. Yubico’s technology enables secure authentication, encryption, and code signing and is used and loved by many of the world’s largest organisations and millions of customers in more than 160 countries.

Benefits Of YubiKey

Any software downloaded on a computer or phone is vulnerable for malware and hackers. The YubiKey is based on hardware with the authentication secret stored on a separate secure chip built into the YubiKey, with no connection to the internet so it cannot be copied or stolen.

The YubiKey dramatically reduces the number one IT support cost – password resets. By switching from mobile one time passwords (OTPs) to YubiKeys. Google saw the following results: Zero account takeovers, 4x faster logins, 92% fewer IT support calls.

Users don’t need to install anything and can use the YubiKey in minutes. And the YubiKey is reliable because it does not require a battery or cellular connectivity, so it’s always on and accessible. It’s highly robust, water and crush-resistant.

IT can deploy YubiKeys in days, not months. A single key, through its flexible multi-protocol capabilities, can work out-of-the-box with hundreds of systems, both cloud and on-premises. This eliminates the need for costly integrations or separate devices for each system.

Yubico is the principal inventor of the FIDO2/WebAuthn and U2F authentication standards adopted by the FIDO Alliance and is the first company to produce the U2F security key and a multiprotocol FIDO2/WebAuthn authenticator. YubiKeys are produced in our offices in the USA and Sweden, maintaining security and quality control over the entire manufacturing process.

What is cyber security-CyberWhite

Loved By Many Of The World’s Largest Organisations

Yubico’s technology enables secure authentication, encryption, and code signing and is used and loved by many of the world’s largest organisations and millions of customers in more than 160 countries.

Please complete the form below to find out more.

Contact Us

    Contact Form Image

    What Our Clients Say

    “CyberWhite have been a pleasure to deal with by repeatedly demonstrating their professionalism and technical knowledge throughout the procurement process and execution of our project. From initially exploring our goals to a consultant working with us on-site and remotely, we’ve enjoyed a positive experience that has ultimately benefited our organisation and helped to improve our Cyber Security posture.”

    Read More
    Head of Network and Infrastructure

    View our video Testimonial from Clear Links by Gerard Norris, Central Operations Manager

    Gerard Norris, Central Operations Manager

    View our video Testimonial from Hays Travel by Ken Campling, Group Finance Director

    Ken Campling, Group Finance Director

    “I would like to say a thousand “thank you’s” to CyberWhite after rescuing us from the commercial disaster we faced after being subjected to a very sophisticated fraud. Without the timely involvement and expertise from CyberWhite, we would undoubtedly have faced catastrophic consequences including a significant financial loss and possibly a forced closure of the business. We will always remember the kindness and professional approach taken by the CyberWhite team. They were able to successfully recover the critical data which was the life blood of our business. This expertise has allowed us to continue trading and provided us with the additional benefits of ensuring that we are more cyber risk aware and we now have a security partner to support us.”

    Read More
    Jon Moore, Director

    Our video Testimonial from Mental Health Concern (NHS) by Lawrence Thompson, Head of IT

    Lawrence Thompson, Head of IT

    “As an Operator of Essential Services, PX Group comply with advice provided by recognised security bodies such as NCSC. The advice is relevant to all organisations who provide infrastructure or support to the UK’s critical national infrastructure. PX Group engaged CyberWhite to undertake Third Party Security Audits (aligned to ISO28000:2007) against key suppliers who had access to information assets within the PX Group domain. CyberWhite created a comprehensive audit document set and supported this with interviews and visits in order to validate responses. The output from CyberWhite was comprehensive and provided security assurance to PX Groups stakeholders and interested parties that the key suppliers had a focus on security and understood and could demonstrate best practices in relation to the handling of PX Groups information assets. This process has been invaluable in validating what we believed and providing a platform from which we will continue to assess, review and benchmark all parties in our information supply chain.”

    Read More
    Lee Farrow, ICT Network & Security Specialist