2FA – not just for employees, but vendors as well

Versasec ecosystem showcase

Protecting your organization from a potential data breach starts with providing secure two-factor authentication (2FA) for all employees. Once employees are protected, you need to think about vendors and third parties that have access to your network, customer files, and other sensitive data. Do they have the appropriate protections put in place?

According to a recent Google study, 3.3 billion user credentials were exposed by third-party breaches from March 2016 to March 2017. For example, Target was the victim of a big data breach in 2013 that started when their HVAC vendor’s credentials were compromised. Breaches through third party vendors can be greatly reduced or completely avoided by mandating use of 2FA in order to access your systems.

The use of 2FA is one of the most powerful and well established techniques for strengthening credentials. It’s been around since the 1970s with the introduction of smart card technology —  although, deploying and managing 2FA with smart cards has historically been cumbersome. Since then, smart card 2FA has advanced with new, easy-to-use technologies such as the YubiKey and Versasec.

versasec logo
Ecosystem Showcase: Versasec

Together, these technologies allow organizations to quickly increase security. Not only can enterprises mandate 2FA for employees and third party vendors, but they can also manage each user’s level of access and revoke it as needed by utilizing Versasec’s secure identity & access management solution. Versasec eases the deployment of 2FA with smart cards for organizations of any size by enabling admins to issue and manage user credentials. Users are then able to easily and securely authenticate to enterprise systems from across the cloud to SasS and on-premise applications..

With Versasec’s vSEC:CMS, enterprises can provision a YubiKey for each user, letting them quickly authenticate for login, secure email, or code signing and more with a simple touch using their YubiKey as a PIV-compatible smart card and reader. vSEC:CMS also allows the user to securely unblock their pin or load new certificates on their YubiKeys. Administrators can manage, revoke or renew all registered YubiKeys using the vSEC:CMS. The ability to centrally manage user identity and access to critical data across all the different services with Versasec, is a huge win for organizations and admins.

Whether an organization has 20 or 200,000 employees, the YubiKey offers fast and simple deployment. We provide a hosted validation service, open source software and servers. Partners can easily work within the multiple security protocols supported by YubiKeys: OpenPGP, PIV, FIDO U2F, and more.

Yubico is proud to highlight Versasec as part of an ongoing YubiKey ecosystem awareness program. 

Talk to our teamTalk to our team

Share this article:


  • CEO Corner: Entering the second half of 2025 with momentumAs we continue to move further into the second half of 2025, I want to share a look back at our journey so far this year and as well as lay out Yubico’s strategic path ahead.  Resurgence in order growth and key segment wins While net sales declined for Q2, the end of the quarter […]Read moreCEOCEO CornerEarningsMattias Danielsson
  • Survey says: Your dog’s name isn’t a passwordWe all know we should be protecting our digital lives, but what are Americans actually doing? Yubico recently commissioned a survey, conducted by Talker Research, which asked 5,000 Americans in 10 major metro cities across the U.S. about their online security habits. Here’s a closer look at what they found (hint: they’re not as secure as they […]Read moreCompany Newssurvey
  • Passkeys are winning, but security leaders must raise the barPasswords are on their way out. In their place is a new form of login called passkeys that promises stronger security and less frustration. All passkeys offer the rare combination of improved usability and stronger security, especially when compared to passwords alone. But unless we act now, millions could be left more vulnerable than ever. […]Read moreDevice-bound passkeysHardware passkeypasskeyssynced passkeys
  • Your top YubiKey questions, answeredOver the 10+ years I’ve been at Yubico, I’ve had the pleasure of meeting customers, partners and many others talking about digital security. While every conversation is different, I am often asked many of the same questions about YubiKeys. One thing remains consistent: many people know they need better security, but they’re not sure what […]Read moreFAQYubiKey