Tag: Works with YubiKey
-
Experience MFA Everywhere with PingID and YubiKey | Yubico One of the most frequent questions I’m asked to talk about is what sets the YubiKey apart from other security keys. At Yubico, we pride ourselves on making the highest quality, most durable and innovative authentication devices on the market, including the first-ever multi-protocol security keys which combine FIDO2, U2F, one-time password (OATH-HOTP and OATH-TOTP), […] Read more -
Taking strong, hardware-backed MFA where mobile phones can’t go with PingID The need for identity and access management With security breaches becoming a growing and expensive problem, organizations are embracing identity and access management (IAM) platforms like Ping Identity with multi factor authentication (MFA). This technology enables organizations to address expanding security concerns and regulatory requirements within and beyond their employee base, while also reducing complexity […] Read more -
What’s guarding your domain from unauthorized access? Domains are a frequent target for phishing attacks that pose serious privacy risks and potential losses of millions of dollars in brand damage, lost revenue, stolen data, and recovery efforts. The threat of phishing greatly underscores the need to protect the front door to your domain. We are excited to announce that Gandi is the […] Read more -
2FA – not just for employees, but vendors as well Protecting your organization from a potential data breach starts with providing secure two-factor authentication (2FA) for all employees. Once employees are protected, you need to think about vendors and third parties that have access to your network, customer files, and other sensitive data. Do they have the appropriate protections put in place? According to a […] Read more -
Security and compliance—a top priority for Sentry Organizations that outsource certain business functions to Software-as-a-Service (SaaS) providers enjoy many benefits, including cost efficiency and increased productivity. However, despite the advantages, there also comes the potential risks of privacy and data compromise. Due to the nature of cloud computing, SaaS providers are required to take necessary steps and precautions to prove the security, […] Read more -
Okta and Yubico partner to offer strong adaptive authentication With the increasing frequency and scale of identity threats including phishing and man-in-the-middle attacks (MiTM), the best way to prevent a breach is to provide strong multi-factor authentication (MFA). MFA is designed to protect against the range of attacks that rely on stealing user credentials. Organizations can use a variety of techniques, but all work […] Read more -
Privileged credentials—a privilege and a responsibility When it comes to security, organizations have a lot of moving parts to consider. From mobile and desktop devices to servers, line-of-business applications, cloud storage, social media accounts, and more—these are all resources that can contain sensitive company information. Naturally, it’s important to minimize the security risk associated with these channels to help protect enterprise […] Read more -
Embracing the future of strong authentication with FIDO U2F Centrify is a longtime Yubico partner, and together we bring two-factor authentication (2FA) and security to organizations and their global workforces. Today, we are excited to further enhance our joint partnership with Centrify’s commitment to support FIDO Universal 2nd Factor (FIDO U2F) within the Centrify platform. The platform’s upgraded security will be available on December […] Read more -
Layer up with Onion ID and the YubiKey According to the 2017 Thales Data Threat Report, nearly two thirds (63%) of senior security executives polled indicated that their organizations deploy new technologies such as cloud, big data, IOT, and containers before having the security in place to protect them. With 88% feeling vulnerable to a cyberattack, organizations are now starting to shift their […] Read more -
Why email security is mission critical to FastMail According to the Verizon 2017 Data Breach Investigations Report, gaining access to a user’s personal or professional data through a malicious email is a cyber criminal’s weapon of choice. While many users might consider that there is nothing worth taking inside their inbox, they are most likely overlooking how connected their email is to other […] Read more