Archive
Stay up to date on company and partner news, product tips, and industry trends.
-
Ping Identity and Yubico
Ping Identity and Yubico—stronger together Strong, phishing-resistant authentication for every role Together, YubiKey and PingID enable organizations to easily define authentication policies and layer strong protection for everyone across the enterprise. Each user is protected from phishing and account takeovers, preventing hackers from compromising vulnerable targets as a way to accessing critical systems and data. […]
Read more -
Okta and Yubico
Okta Adaptive MFA and YubiKey deliver strong and scalable phishing-resistant authentication solutions Create intelligent policies that adapt the level of identity assurance all the way up to hardware-based authentication for stronger levels of protection. No matter the device, user or login context, Okta Adaptive MFA and YubiKey together deliver a more reliable, compatible, and modern […]
Read more -
Duo Security and Yubico
Duo and YubiKey deliver strong authentication that’s highly secure and easy for users Every user needs strong authentication to access vital applications, services, and data. Duo and YubiKey combine centralized, intelligent security policies, broad compatibility and easy integration with a consistent authentication flow users will appreciate. Together Duo and Yubikey share a focus on the […]
Read more -
Identity Access Management is more secure with YubiKey
Integrating YubiKey with IAM solutions delivers the most secure level of authentication for all users Organizations looking to enhance their security posture can integrate their Identity Access Management platform with a YubiKey to provide hardware-based multi-factor authentication to all their users. This will not only provide the highest level of protection against phishing, but it […]
Read more -
Cloud vs. On-Prem: Why opting for on-prem can cost you your next data breach
Most CISOs and IT teams spend their time asking themselves “when”, not “if”, they will be the next company to suffer a data breach. And rightfully so. The frequency of data breaches is skyrocketing, with no sign of slowing down. To help quantify the problem, recent research from Canalys shows that there were more records […]
Read more -
Ping Identity partner brief
PingID and YubiKey together comprise a modern MFA solution.
Read more -
Okta partner brief
The YubiKey and Okta Adaptive MFA provide the strongest level of identity assurance and defense against phishing and man-in-the-middle attacks, while also delivering a simple and seamless user experience
Read more -
Duo Security partner brief
YubiKeys coupled with Duo MFA provide an easily understood, secure solution.
Read more -
What is IAM (Identity and access management)?
Identity and Access Management Identity and Access Management (often abbreviated IAM) is a combination of technologies, techniques, and policies employed by companies to manage conditional user access across elements of their tech stack. The form IAM takes can vary widely across different enterprises, but the two primary objectives of Identity and Access Management are undeniably […]
Read more -
Lessons from the SolarWinds incident
Last week, a large and expertly run espionage operation was made public — one that began no later than October 2019, and which had been actively exploiting victims since at least early 2020. This incident is particularly interesting for several reasons: for the breadth of sensitive global government and industry targets, for misuse of a […]
Read more