• Get ahead of Texas Cyber Command guidance

    Align with the state’s new cyber defense transformation from Governor Abbott using the YubiKey – the gold standard in phishing-resistant, hardware-backed authentication, created by the pioneers of FIDO open standards.

    Learn more about Cyber Command

    The Threat

    Texas is a global economic powerhouse, making it a primary target for hostile foreign actors. (See: recent Texas Tech University cyber attack)

    95% of all identity-related incidents stem from weak or stolen credentials.

    The Gap

    Legacy multi-factor authentication (like SMS, OTP codes, and mobile push notifications), can be intercepted by modern phishing and man-in-the-middle attacks.

    What’s coming

    Texas organizations will likely need to upgrade to phishing-resistant MFA, such as FIDO2 hardware security keys, to comply with the Cyber Command’s “resilient identity” recommendations.

    The FBI is also recommending security keys to close defensive gaps (see: FBI Operation Winter SHIELD)

    How Yubico Simplifies Your Cybersecurity Transformation

    Direct Alignment with State Strategy

    Yubico is explicitly aligned with the Texas Department of Information Resources (DIR) modernization directives and fits seamlessly into the Texas Digital Identity Services (TDIS) shared services pillar.

    YubiKeys integrate with existing identity and access management (IAM) and identity provider (IDP) solutions such as Microsoft, Okta, DUO, Ping, and over 1,000 applications and services out-of-the-box, including Google Suite, Microsoft Azure, Microsoft Office 365, Box, Jamf, and identity and credential management (ICAM) solutions, eliminating rip and replacement of existing solutions.

    Streamlined Procurement

    Deployments can be operationalized through a partnership with Deloitte, acting as a trusted systems integrator. This accelerates provisioning, training, and change management through established DIR procurement frameworks until the Texas Cyber Command takes over in December.

    Compliance & Security

    YubiKeys offer phishing-resistant security and are FIPS 140-2 validated to meet the highest authentication assurance level 3 requirements (AAL3) of NIST SP800-63B guidelines, Overall Level 1 (Certificate #3907) and Level 2 (Certificate #3914), Physical Security Level 3. YubiKeys are also CJIS, WebAUTHN, FIDO, FIDO2 and DFARS, and NIST SP 800-171 compliant.

    Deploying YubiKeys reduces the risk of exposure to addressable credential and phishing attacks by 99.99%.

    Book a briefing with your Texas Account Director

    Gary Gennarelli

    Austin, TX

    Book a meeting

    Proven for State & Local Government

    State of Washington

    Uses YubiKeys to protect critical election infrastructure

    Read the case study

    City of Southgate, Michigan

    Secured statewide systems for users who previously had mobile-device restrictions, utilizing Yubico’s best practices for a seamless rollout.

    Read the case study

    City of Sacramento

    Shifted to YubiKeys during the remote work surge to secure VPNs without needing to reimburse employees for personal cell phone usage

    Read the case study

    Return on Investment (ROI)

    • According to Forrester, organizations adopting YubiKeys realize a 265% ROI with a payback period of just 8 months.
    • Organizations save by eliminating legacy MFA licensing costs and by reducing password-reset help desk tickets down to near zero.

    Ease of Deployment

    • Flexible OpEx spending: Transition from unpredictable capital expenditures to a predictable operating expense. YubiKey as a Service (YaaS) offers budget predictability with a subscription model.
    • Turnkey delivery: Utilize YubiEnterprise Delivery (YED) to have keys shipped directly to homes and offices, taking the logistical burden off your staff.
    Book a meeting

    Yubico protects the world’s leading brands