Tag: Ping Identity

Ping Identity and Yubico

Ping Identity and Yubico—stronger together Strong, phishing-resistant authentication for every role Together, YubiKey and PingID enable organizations to easily define authentication policies and layer strong protection for everyone across the enterprise. Each user is protected from phishing and account takeovers, preventing hackers from compromising vulnerable targets as a way to accessing critical systems and data.

Identity Access Management is more secure with YubiKey

Integrating YubiKey with IAM solutions delivers the most secure level of authentication for all users Organizations looking to enhance their security posture can integrate their Identity Access Management platform with a YubiKey to provide hardware-based multi-factor authentication to all their users. This will not only provide the highest level of protection against phishing, but it

Thumbnail

Centrify, Ping Identity, and Yubico: Considerations for a Zero Trust Security Model

Learn how Centrify, Ping Identity, and Yubico come together to provide insights on how their joint solutions can help address a zero trust security model

Thumbnail

Ping Identity partner brief

PingID and YubiKey together comprise a modern MFA solution.

Thumbnail

Nov 5, 2018

The Modern Workplace Journey: Experience MFA Everywhere with PingID and the YubiKey

One of the most frequent questions I’m asked to talk about is what sets the YubiKey apart from other security keys. At Yubico, we pride ourselves on making the highest quality, most durable and innovative authentication devices on the market, including the first-ever multi-protocol security keys which combine FIDO2, U2F, one-time password (OATH-HOTP and OATH-TOTP),

Thumbnail

The Modern Workplace Journey: Experience MFA Everywhere with PingID and the YubiKey

One of the most frequent questions I’m asked to talk about is what sets the YubiKey apart from other security keys. At Yubico, we pride ourselves on making the highest quality, most durable and innovative authentication devices on the market, including the first-ever multi-protocol security keys which combine FIDO2, U2F, one-time password (OATH-HOTP and OATH-TOTP),

Thumbnail

Taking strong, hardware-backed MFA where mobile phones can’t go with PingID

The need for identity and access management With security breaches becoming a growing and expensive problem, organizations are embracing identity and access management (IAM) platforms like Ping Identity with multi factor authentication (MFA). This technology enables organizations to address expanding security concerns and regulatory requirements within and beyond their employee base, while also reducing complexity