• Contact Sales
  • Resellers
  • Support
Yubico Header Text LogoYubico Header Text Logo
Why Yubicoexpand_more
Why Yubico
  • Enterprises
  • SMBs
  • Individuals
  • Developers
  • Careers
  • Partner programs
  • Affiliate program
  • Contact Sales
  • Events
  • Press room
  • Yubico Blog
  • Yubico Executive Connect
  • About us
  • The team
  • Investors
  • Innovation history
  • Secure it Forward
Man holding YubiKey
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and usability

Why YubiKey
Google headquarters
Proven at scale at Google

Google defends against account takeovers and reduces IT costs

Google Case Study
Hand holding YubiKey behind Apple iPhone
Protecting vulnerable organizations

Secure it Forward: One YubiKey donated for every 20 sold

Learn about Secure it Forward
Productsexpand_more
All products
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Computer login tools
  • Software Development Toolkits
  • YubiCloud
  • Using YubiKey is easy
  • Find the right YubiKey
  • Works with YubiKey
  • Compare YubiKeys
Woman holding YubiKey 5ci
One key for hundreds of apps and services

YubiKey works out-of-the-box and has no client software or battery

Yubico protects you
See YubiKeys as a Service
YubiEnterprise Subscription delivers scale and savings

Gain a future-proofed solution and faster MFA rollouts

See YubiKeys as a Service
Solutionsexpand_more
Solutions overview
  • Zero Trust
  • Executive Order OMB M-22-09
  • Phishing-resistant MFA
  • Passwordless
  • Compliance
  • Cyber Insurance
  • Secure supply chain
  • Critical infrastructure
  • Hybrid & remote workers
  • Secure privileged users
  • Mobile restricted environments
  • Call centers
  • Shared workstations
  • Microsoft ecosystem
  • Salesforce workspace
  • IAM solutions
  • AWS environment
  • HYPR experience
Hand holding YubiKey behind Apple iPhone
The Bridge to Passwordless

Begin the journey to make your organization passwordless

Get the white paper
Lock on a laptop
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
Government building
Federal cybersecurity requirements

See guidance for CIOs and leaders to prepare for the modern cyber threat era

Get the white paper
Industriesexpand_more
Industries overview
  • High tech
  • Federal government
  • Federal systems integrators
  • State & local government
  • Education
  • Financial services
  • Elections & campaigns
  • Retail & hospitality
  • Telecommunications
  • Healthcare
  • Pharmaceuticals
  • Cryptocurrency
  • Energy & natural resources
  • Manufacturing
man working a manufacturing line
Manufacturing and supply chain security

Authentication best practices for manufacturing using highest-assurance security

Get the white paper
Person looking at a computer with a government building showing
Phishing-resistant MFA: Fact vs. Fiction

Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines

Get the white paper
Remote workers at a wind farm
Secure energy and natural resources from cyber threats

Best practices for phishing-resistant MFA to safeguard your critical infrastructure

Get the white paper
Resourcesexpand_more
All resources
  • Yubico Blog
  • Cybersecurity glossary
  • Authentication standards
  • Resource library
  • Developer program
  • Product briefs
  • Solution briefs
  • Case studies
  • Get a pilot started
  • White papers and reports
  • Webinars
Laptop with a YubiKey inserted
BeyondTrust: secured with a subscription

A leader in Privileged Access Management simplifies YubiKey deployment

How they optimized ROI
S&P Global Market Intelligence report: old habits die hard

Only 46% of respondents protect their applications with MFA. How about you?

Read the report
Considering Passkeys for your Enterprise?

Learn how to avoid the common pitfalls of synced passkeys

Get the Ebook
Supportexpand_more
Support home
  • Find the right YubiKey
  • Set up your YubiKey
  • Downloads
  • Product documentation
  • Support articles
  • Support Services
  • Professional Services
  • YubiEnterprise Subscription
  • Works with YubiKey Program
  • Buying and shipping information
  • Security advisories
  • Help center
YubiKeys in lots of form factors
How to set up your YubiKey

Follow our guided tutorials to start protecting your favorite services

Set up your YubiKey
YubiKey on a keychain plugged into a laptop
Find the best YubiKey for your needs

Take the guided quiz and see which YubiKey best fits your or your businesses needs

Take the quiz
Worker with a calculator and laptop with a spreadsheet
Accelerate your YubiKey deployment

Technical and operational guidance for your YubiKey implementation and rollout

Professional Services
SubscribeStore
  • Stop account takeovers

    Yubico Hero Image

    Every second, a phishing attack takes place.

    9 out of 10 cybersecurity breaches are caused by simple mistakes such as clicking on fraudulent links that look real but are not.

    Yubico can help.

    Image

    Yubico’s award-winning security key, the YubiKey, is 100% built for security and trusted by millions, delivering modern authentication and peace of mind to Enterprises, SMBs, Individuals, and Developers.

    Changing the game for modern phishing-resistant authentication

    The YubiKey is hardware authentication reimagined. Secure the identities of your employees and users, reduce support costs, and experience an unmatched user experience.

    Icon

    0 account takeovers

    Icon

    92% reduction in support calls

    Icon

    4x faster login

    Legacy MFA can be easily bypassed

    In this video, ethical hacker Rachel Tobac explains how a typical modern cyber attack works, and shows how hardware security keys offer better security than legacy MFA such as mobile authentication.

    Move away from broken MFA

    Did you know 90% of all internet breaches are due to stolen login credentials? SMS, mobile authentication apps, and legacy one-time passcodes (OTPs) are vulnerable to today’s advanced threats.

    To stop modern threats you must have modern phishing-resistant authentication.

    Read the Forrester Consulting study commissioned by Yubico and see how a composite  organization reduced risk by 99.9%, saw a drop in password-related helpdesk tickets by 75%, and experienced a 203% 3-year ROI with YubiKeys.

    “We run our environment through various penetration tests and simulated attacks and, of course, YubiKeys stand up against all that.”

    Director of security engineering, Energy
    people in a line

    Protecting from human error

    Employees are busy and can be distracted. In fact, 9 out of 10 cybersecurity breaches are caused by employee mistakes.

    The YubiKey protects the human layer by eliminating “MFA fatigue.” Remove the guesswork and ensure your employees, and only your employees, can get in.

    security protocols

    True phishing-resistant MFA

    As part of a Zero Trust framework, phishing-resistant MFA is immune to attackers intercepting or even tricking users into revealing credentials.

    The YubiKey is your Key to Trust, supporting the strongest phishing-defense available with WebAuthn/FIDO (passkeys) and Smart Card/PIV authentication.


    How YubiKey works

    No more reaching for your phone to open an app, or memorizing and typing in a code – simply touch the YubiKey to verify and you’re in. Additionally, you don’t need to use the YubiKey every time. Once an app or service is verified, it can stay trusted. It’s that easy.

    YubiKeys are available in a wide range of form factors, support multiple authentication protocols and work with hundreds of applications and services. They do not require a mobile connection or batteries, are water and crush-resistant, and last a really long time.

    Ready to scale phishing-resistant MFA?

    Experience YubiKeys as a Service with YubiEnterprise Subscription. Modern threats can only be stopped with modern security across your organization.

    What the industry is saying

    “Yubico’s role in the industry is unique, the solutions that Yubico offers today are the next generation of identity security. The rest of the world needs to catch up with Yubico and not the other way around.”

    Steve Brasen, Research Director, Enterprise Management Associates

    Ordering for more than 500 users? Learn about how YubiEnterprise Subscription delivers strong security in a more flexible and cost-effective way. Gain peace of mind for less than $4 per user per month

    Discover subscription

    What do these tech leaders have in common?

    They all support YubiKeys for modern authentication

    See more

    Case studies

    See more
    Figma implements strong security
    Read the case study
    Arvika Municipality enhances security
    Read the case study
    Schneider Electric implements MFA
    Read the case study

    Featured Content

    See more
    EO on laptop

    Think you’re not impacted by the new Executive Order on cybersecurity? Think again.

    Read more
    YubiKey plugged into laptop

    Stop ransomware attacks before they take hold. Do it with true phishing-resistant MFA

    Read white paper
    woman working at computer

    Looking for cyber insurance but the bar is now higher? Consider phishing-resistant MFA.

    Read more

    In the press

    See more
    wall street journal logo
    The Strongest Protection for your account is this little key
    ZD net
    The best security keys you can buy
    verge logo
    How to set up two-factor authentication on your online services
    washington post logo
    Your iPhone has powerful new security features. Do you need them
    new york times logo
    RIP, Passwords. Here’s What’s Coming Next.
    wired logo
    How to Unlock Your iPhone With a Security Key

    Get Started

    YubiKey grid
    Find the right YubiKey

    Take a quick product finder quiz and find the right YubiKey for you or your business.

    Start quiz
    YubiKey with phone
    Set up your YubiKey

    Set up your YubiKey as a form of two-factor authentication and secure supported services.

    Get started
    YubiKey in laptop
    Trusted, modern MFA

    Loved by Enterprises, SMBs, Individuals, and Developers.

    Learn more
Yubico Text LogoYubico Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • GitHub
  • Product finder quiz
  • Find set-up guides
  • Buy online
  • Contact sales
  • Get Yubico updates
  • Careers
  • Events
  • Press room
  • About us
  • Investors
  • Partner programs
  • Affiliate program
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • Yubico Authenticator
  • Zero Trust
  • Phishing-resistant MFA
  • Passwordless
  • Cyber insurance
  • More solutions
  • Industries overview
  • Yubico blog
  • Resource library
  • Cybersecurity glossary
  • Authentication standards
  • Developer program
  • Works with YubiKey
  • Help center
  • Downloads
  • Product documentation
  • Support Services
  • Professional Services
  • Contact support
Yubico © 2023 All Rights Reserved.
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust