• Get ahead of Texas Cyber Command guidance

    Align with the state’s new cyber defense transformation from Governor Abbott using the YubiKey – the gold standard in phishing-resistant, hardware-backed authentication, created by the pioneers of FIDO open standards.

    Learn more about Cyber Command

    The Threat

    Texas is a global economic powerhouse, making it a primary target for hostile foreign actors. (See: recent Texas Tech University cyber attack)

    95% of all identity-related incidents stem from weak or stolen credentials.

    The Gap

    Legacy multi-factor authentication (like SMS, OTP codes, and mobile push notifications), can be intercepted by modern phishing and man-in-the-middle attacks.

    What’s coming

    Texas organizations will likely need to upgrade to phishing-resistant MFA, such as FIDO2 hardware security keys, to comply with the Cyber Command’s “resilient identity” recommendations.

    The FBI is also recommending security keys to close defensive gaps (see: FBI Operation Winter SHIELD)

    How Yubico Simplifies Your Cybersecurity Transformation

    Direct Alignment with State Strategy

    Yubico is explicitly aligned with the Texas Department of Information Resources (DIR) modernization directives and fits seamlessly into the Texas Digital Identity Services (TDIS) shared services pillar.

    YubiKeys integrate with existing identity and access management (IAM) and identity provider (IDP) solutions such as Microsoft, Okta, DUO, Ping, and over 1,000 applications and services out-of-the-box, including Google Suite, Microsoft Azure, Microsoft Office 365, Box, Jamf, and identity and credential management (ICAM) solutions, eliminating rip and replacement of existing solutions.

    Streamlined Procurement

    Deployments can be operationalized through a partnership with Deloitte, acting as a trusted systems integrator. This accelerates provisioning, training, and change management through established DIR procurement frameworks until the Texas Cyber Command takes over in December.

    Compliance & Security

    YubiKeys offer phishing-resistant security and are FIPS 140-2 validated to meet the highest authentication assurance level 3 requirements (AAL3) of NIST SP800-63B guidelines, Overall Level 1 (Certificate #3907) and Level 2 (Certificate #3914), Physical Security Level 3. YubiKeys are also CJIS, WebAUTHN, FIDO, FIDO2 and DFARS, and NIST SP 800-171 compliant.

    Deploying YubiKeys reduces the risk of exposure to addressable credential and phishing attacks by 99.99%.

    Book a briefing with your Texas Account Director

    Gary Gennarelli

    Austin, TX

    Book a meeting

    Proven for Education

    Palo Alto Unified School District

    Deployed 3,000+ YubiKeys to secure sensitive student data and create a ‘gold standard’ for cybersecurity in education.

    Read the case study

    Duke University

    Utilized YubiKeys to provide lightning-fast, hardware-based security for staff logging into critical systems 40+ times a day.

    Read the case study

    Virginia Tech

    Protects $502M in research and 34k+ users by eliminating the threat of sophisticated phishing attacks. VT also met strict federal compliance guidelines by making YubiKeys a standard part of the student and faculty experience.

    Read the case study

    Return on Investment (ROI)

    • According to Forrester, organizations adopting YubiKeys realize a 265% ROI with a payback period of just 8 months.
    • Organizations save by eliminating legacy MFA licensing costs and by reducing password-reset help desk tickets down to near zero.

    Ease of Deployment

    • Flexible OpEx spending: Transition from unpredictable capital expenditures to a predictable operating expense. YubiKey as a Service (YaaS) offers budget predictability with a subscription model.
    • Turnkey delivery: Utilize YubiEnterprise Delivery (YED) to have keys shipped directly to homes and offices, taking the logistical burden off your staff.
    Book a meeting

    Yubico protects the world’s leading brands