Tag: privileged users


Phoenix Software protects the public sector supply chain with YubiKeys
Responding to the growing cybersecurity threat Shaun Tosler, Infrastructure Manager at Phoenix, works closely with the Phoenix CTO and Bytes Technology Group CISO to look after all IT infrastructure internally and those that run managed services. His challenge is to maintain a high-level of security while ensuring ease of access and usability for both their …

BeyondTrust case study
More than 20,000 customers trust BeyondTrust with Internet Access Management. As a security company themselves, BeyondTrust takes their brand reputation and internal security seriously, and have invested in strong MFA from a partner like Yubico. The case study walks through how BeyondTrust has increased their security posture with a phased rollout of YubiKeys and has not only strengthened their cybersecurity defenses, but have done it in a predictable and efficient way with YubiEnterprise Subscription and YubiEnterprise Delivery services.

Feb 22, 2022
Privileged Access Management at CERN: Q&A with Dr. Stefan Lüders
In an era of increasing cyber attacks, how do you balance the desire for unrestricted research freedom against the need to protect that research from cyber threats? This is the challenge faced by CERN, leaders in the scientific research community. Their solution? Provide a clear articulation of what constitutes privileged data, and create flexible security …

The critical strong authentication need for privileged users: Why legacy authentication is putting your privileged users at risk
Step one in any effective cyber security program includes securing privileged accounts, credentials, and secrets with modern strong authentication. Download the Yubico White Paper, The critical strong authentication need for privileged users, to learn who really is a privileged user, and industry best practices to secure your privileged users against phishing attacks and account takeovers.
Enable secure privileged access management
Watch the webinar Learn why securing privileged users and accounts with phishing-resistant multi-factor authentication (MFA) is a critical need across the industry. Modern privileged access management Privileged access management is critical, as these users are prime targets for cybercriminals. The YubiKey ensures that all privileged users follow a higher bar of security, in turn protecting …