Tag: identity and access management

Home » identity and access management
  • Yubico LogoPing Identity and YubicoYubico and Ping Identity: Strengthening phishing-resistant MFA for a passwordless future Weak and stolen passwords often lead to security breaches and productivity losses due to password resets. The Ping Identity Platform, combined with YubiKey’s hardware security keys, enables robust, phishing-resistant multi-factor authentication, paving the way for a secure, passwordless future. This integration allows organizations to […]Read moreidentity and access managementPing Identity
  • Yubico LogoYubico and OktaOrganizations can combine the adaptive access management of Okta and YubiKey’s strong MFA to provide the right authentication for every situation.Read moreauthenticationidentity and access managementOkta
  • Yubico LogoDuo Security and YubicoDuo and YubiKey deliver strong authentication that’s highly secure and easy for users Every user needs strong authentication to access vital applications, services, and data. Duo and YubiKey combine centralized, intelligent security policies, broad compatibility and easy integration with a consistent authentication flow users will appreciate. Together Duo and Yubikey share a focus on the […]Read moreDuo securityidentity and access management
  • Yubico LogoIdentity Access Management is more secure with YubiKeyIntegrating YubiKey with IAM solutions delivers the most secure level of authentication for all users Organizations looking to enhance their security posture can integrate their Identity Access Management platform with a YubiKey to provide hardware-based multi-factor authentication to all their users. This will not only provide the highest level of protection against phishing, but it […]Read moreDuo securityidentity and access managementOktaPing Identity
  • Cloud vs. On-Prem: Why on-prem can bring your next data breachMost CISOs and IT teams spend their time asking themselves “when”, not “if”, they will be the next company to suffer a data breach. And rightfully so. The frequency of data breaches is skyrocketing, with no sign of slowing down.  To help quantify the problem, recent research from Canalys shows that there were more records […]Read moredata breachdigital transformationidentity and access management
  • Ping Identity partner briefPingID and YubiKey together comprise a modern MFA solution.Read moreidentity and access managementMFAPing Identity
  • okta partner solution briefOkta partner briefThe YubiKey and Okta Adaptive MFA provide the strongest level of identity assurance and defense against phishing and man-in-the-middle attacks, while also delivering a simple and seamless user experienceRead moreidentity and access managementMFAOkta
  • Duo Security partner briefYubiKeys coupled with Duo MFA provide an easily understood, secure solution.Read moreDuo securityidentity and access managementMFA
  • Yubico LogoWhat is IAM (Identity and access management)?Identity and Access Management Identity and Access Management (often abbreviated IAM) is a combination of technologies, techniques, and policies employed by companies to manage conditional user access across elements of their tech stack. The form IAM takes can vary widely across different enterprises, but the two primary objectives of Identity and Access Management are undeniably […]Read moreidentity and access managementMFAsecurity
  • Lessons from the SolarWinds incidentLast week, a large and expertly run espionage operation was made public — one that began no later than October 2019, and which had been actively exploiting victims since at least early 2020. This incident is particularly interesting for several reasons: for the breadth of sensitive global government and industry targets, for misuse of a […]Read moreidentity and access managementNISTsecurityWebAuthn