• Contact Sales
  • Subscription
  • Resellers
  • Support
Yubico Header Text LogoYubico Header Text Logo
Why Yubicoexpand_more
Why Yubico
  • Enterprises
  • SMBs
  • Individuals
  • Developers
  • Careers
  • Partner programs
  • Affiliate program
  • Contact Sales
  • Events
  • Press room
  • Yubico Blog
  • Yubico Executive Connect
  • About us
  • The team
  • Innovation history
  • Secure it Forward
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and usability

Why YubiKey
  • about Yubico
  • press
Proven at scale at Google

Google defends against account takeovers and reduces IT costs

Google Case Study
  • about Yubico
  • press
Protecting vulnerable organizations

Secure it Forward: One YubiKey donated for every 20 sold

Learn about Secure it Forward
  • about Yubico
  • press
Productsexpand_more
All products
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Computer login tools
  • Software Development Toolkits
  • YubiCloud
  • Using YubiKey is easy
  • Find the right YubiKey
  • Works with YubiKey
  • Compare YubiKeys
One key for hundreds of apps and services

YubiKey works out-of-the-box and has no client software or battery

Yubico protects you
  • about Yubico
  • press
See YubiKeys as a Service
YubiEnterprise Subscription delivers scale and savings

Gain a future-proofed solution and faster MFA rollouts

See YubiKeys as a Service
  • about Yubico
  • press
Solutionsexpand_more
Solutions overview
  • Zero Trust
  • Executive Order OMB M-22-09
  • Phishing-resistant MFA
  • Passwordless
  • Compliance
  • Cyber Insurance
  • Secure supply chain
  • Hybrid & remote workers
  • Secure privileged users
  • Mobile restricted environments
  • Call centers
  • Shared workstations
  • Microsoft ecosystem
  • Salesforce workspace
  • IAM solutions
  • AWS environment
The Bridge to Passwordless

Begin the journey to make your organization passwordless

Get the white paper
  • about Yubico
  • press
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
  • about Yubico
  • press
Federal cybersecurity requirements

See guidance for CIOs and leaders to prepare for the modern cyber threat era

See Gartner® Report
  • about Yubico
  • press
Industriesexpand_more
Industries overview
  • High tech
  • Federal government
  • State & local government
  • Education
  • Financial services
  • Manufacturing
  • Energy & natural resources
  • Retail & hospitality
  • Telecommunications
  • Healthcare
  • Pharmaceuticals
  • Cryptocurrency
  • Elections & campaigns
Manufacturing and supply chain security

Authentication best practices for manufacturing using highest-assurance security

Get the white paper
  • about Yubico
  • press
Phishing-resistant MFA: Fact vs. Fiction

Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines

Get the white paper
  • about Yubico
  • press
Secure energy and natural resources from cyber threats

Best practices for phishing-resistant MFA to safeguard your critical infrastructure

Get the white paper
  • about Yubico
  • press
Resourcesexpand_more
All resources
  • Yubico Blog
  • Cybersecurity glossary
  • Authentication standards
  • Resource library
  • Developer program
  • Product briefs
  • Solution briefs
  • COVID-19 Resources
  • Case studies
  • Get a pilot started
  • White papers and reports
  • Webinars
BeyondTrust: secured with a subscription

A global leader in Privileged Access Management adopts YubiEnterprise Subscription to simplify its deployment.

How they optimized ROI
  • about Yubico
  • press
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
  • about Yubico
  • press
Secure shared workstations against cyber threats

Shared workstations can be secured with phishing-resistant MFA.

Get the white paper
  • about Yubico
  • press
Supportexpand_more
Support home
  • Find the right YubiKey
  • Set up your YubiKey
  • Downloads
  • Product documentation
  • Support articles
  • Support Services
  • Professional Services
  • YubiEnterprise Subscription
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust
How to set up your YubiKey

Follow our guided tutorials to start protecting your favorite services.

Set up your YubiKey
  • about Yubico
  • press
Find the best YubiKey for your needs

Take the guided quiz and see which YubiKey best fits your or your businesses needs.

Take the quiz
  • about Yubico
  • press
Accelerate your YubiKey deployment

Technical and operational guidance for your YubiKey implementation and rollout.

Professional Services
  • about Yubico
  • press
SubscribeStore
  • Home » In the news » Archives 2015

    Yubico in the news 2015

    Check out Yubico’s latest press mentions.
    If you can’t find what you’re looking for, let us know at:
    press@yubico.com

    2015

    12 Gifts for IT Departments This Holiday Season

    IDG Connect
    December 14, 2015

    3 Ways to Ramp Up Your Family’s Online Security This Thanksgiving

    Forbes
    November 24, 2015

    Read here

    Docker Announces Universal Control Plane Beta, First Hardware Signing System

    Application Development Trends
    November 23, 2015

    Read here

    Docker Releases Hardware Signing of Container Images

    SD Times
    November 19, 2015

    Read here

    Docker, Yubico Team Up to Secure App Development

    Linux Insider
    November 19, 2015

    Read here

    Docker Tightens Security Over Container Vulnerabilities

    InformationWeek
    November 17, 2015

    Read here

    Docker Puts Focus On Container Security

    TechCrunch
    November 16, 2015

    Read here

    Docker Doubles Down on Seucirty with Nautilus, Hardware Encryption

    eWeek
    November 16, 2015

    Read here

    Docker Content Trust Gets Hardware Signing to Boost Security of Containerized Applications

    Computer Technology Review
    November 16, 2015

    Docker Unveils Extra Container Security Features

    ITProPortal
    November 16, 2015

    Read here

    DockerConEU: 5 First Day Take-Aways

    Computer Business Review
    November 16, 2015

    Docker Gets a Lot More Secure with User Namespaces and New Image Controls

    SiliconAngle
    November 16, 2015

    Read here

    #TwoFactorTuesday: Post Password Security is Here

    Mobile ID World
    October 7, 2015

    Read here

    GitHub’s Newest Partnership Could Do Wonders For Web Security

    Fortune
    October 1, 2015

    Read here

    GitHub Launches Support for U2F Security Keys

    TechCrunch
    October 1, 2015

    Read here

    GitHub Pushes Real Buttons to Make the Internet More Secure

    Wired
    October 1, 2015

    Read here

    GitHub Adds Hardware-based Authentication for Developers

    InfoWorld
    October 1, 2015

    Read here

    GitHub Improves Two-Factor Security with U2F

    eWeek
    October 1, 2015

    Read here

    GitHub Accounts Can Now Be Protected with U2F Authentication

    The Next Web
    October 1, 2015

    Read here

    Okta Beefs Up Multi-Factor Authentication

    TechCrunch
    September 10, 2015

    Read here

    Dropbox Now Supports USB Security Keys

    Lifehacker
    August 14, 2015

    Read here

    Dropbox Beefs Up Security with USB Keys

    PCMagazine
    August 13, 2015

    Read here

    Dropbox Adds Security Key Two-Factor Authentication

    SCMagazine
    August 13, 2015

    Read here

    Dropbox Adds USB Two Factor Authentication

    The Register
    August 12, 2015

    Read here

    Dropbox Rolls Out USB Keys to Keep Your Files Safer

    Cult of Mac
    August 12, 2015

    Read here

    Dropbox Will Now Let You Use a USB Key for Two-Factor Login

    The Verge
    August 12, 2015

    Read here

    Dropbox Adds Support for U2F Security Keys

    TechCrunch
    August 12, 2015

    Read here

    Dropbox Now Lets You Log In with a USB Key for Universal 2nd Factor Authentication

    VentureBeat
    August 12, 2015

    Read here

    Dropbox Adds U2F Support for Better Security

    PCWorld
    August 12, 2015

    Read here

    Lock Down Your Dropbox Account with a USB Security Key

    Engadget
    August 12, 2015

    Read here

    Dropbox Adds USB Security Key Support

    SlashGear
    August 12, 2015

    Read here

    Bluetooth SIG, FIDO collaboration could bring better security to Internet of Things

    FierceWirelessTech
    July 26, 2015

    Read here

    FIDO Alliance Extends Two-Factor Security Standards to Bluetooth, NFC

    eWeek
    July 1, 2015

    Read here

    Universal Two-Factor Authentication Just Got More Universal

    PCMagazine
    June 30, 2015

    Read here

    FIDO Two-Factor Authentication Goes Wireless

    Network World
    June 30, 2015

    Read here

    How to Make Two-Factor Authentication Work for You

    PCMagazine
    June 29, 2015

    Read here

    YubiKey NEO and a Better Password Manager

    Drupal Watchdog
    June 12, 2015

    Read here

    Ping eyes improved cloud identity security with new platform

    TechTarget
    June 9, 2015

    Read here

    Ping Identity Connects Identity Control and Security

    eWeek
    June 8, 2015

    Read here

    YubiKey. Once you’ve tried it, you won’t go back

    Hacking Insider
    June 8, 2015

    Read here

    Passé Words

    The Economist – Technology Quarterly: Q2 2015
    May 30, 2015

    Read here

    The IRS Could Have Prevented Its Latest Data Hack. Time for Some TFA

    Forbes
    May 27, 2015

    Read here

    Google, Samsung get closer to giving passwords the finger with FIDO certification

    ZDNet
    May 22, 2015

    Read here

    Google, Samsung, and 16 others receive post-password certification

    The Verge
    May 21, 2015

    Read here

    Own Your Own Identity With Universal Two-Factor Authentication

    PC Magazine
    May 8, 2015

    Read here

    Google bolsters security by offering Security Keys to business customers

    AndroidGuys
    April 23, 2015

    Read here

    Google Security Key is a Hardware Device that Makes Logging in Faster and Safer

    Lifehacker
    April 22, 2015

    Read here

    YubiKey Devices Now Compatible with Google Drive for Work

    Mobile ID World
    April 22, 2015

    Read here

    Protect you Google Accounts with a USB Security Key

    Digital Inspiration
    April 21, 2015

    Read here

    Google is bringing Security Keys to Google Drive for Work users

    Android Authority
    April 21, 2015

    Read here

    Google announces Security Keys for Google Drive for Work accounts

    Androidcentral
    April 21, 2015

    Five Simple Steps to Protect Corporate Data

    Wall Street Journal
    April 19, 2015

    Read here

    Google, WordPress, LastPass, Salesforce – new USB token secures them all

    CSO
    April 18, 2015

    Read here

    Two factor authentication at its best, YubiKey

    Hacking Insider
    April 8, 2015

    Read here

    Using a Chromebook with LastPass and two-factor authentication

    TechWorld
    April 7, 2015

    What is YubiKing 2015?

    Hacking Insider
    March 28, 2015

    Read here

    9 Security Gadgets for Mobile Devices

    Computerworld
    March 27, 2015

    Read here

    YubiKey: Unlocking Your Future

    Androidistica
    February 19, 2015

    Read here

    50 Women in Tech Dominating Silicon Valley

    Tech Cocktail
    February 18, 2015

    Read here

    Windows 10 to Adopt FIDO Post-Password Protection

    The Inquirer
    February 17, 2015

    Read here

    Moving Beyond Passwords

    SF Gate
    February 14, 2015

    Read here

    Factbox: White House cybersecurity summit draws big CEO crowd

    Reuters
    February 11, 2015

    When it comes to encouraging innovation, culture is key

    The Enterprisers Project
    January 22, 2015

    Read here

    Recap of White House Security Efforts

    Security Today
    January 14, 2015

    Read here

    CES 2015: Simple and Strong Authentication with YubiKey

    aNewDomain
    January 8, 2015

    CES 2015 in Las Vegas exhibited numerous products for legal profesionals and law firms

    Law Technology News
    January 9, 2015

    Read here

    YubiKey want to be like TouchID for your Intenet Life

    Cult of Mac
    January 7, 2015

    Read here

    10 CES 2015 ShowStoppers

    Network World
    January 6, 2015

    Read here

    Archives

    2020

    View all

    2019

    View all

    2018

    View all

    2017

    View all

    2016

    View all

    2014

    View all
Yubico Footer Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • GitHub
  • Product finder quiz
  • Find set-up guides
  • Buy online
  • Contact sales
  • Get Yubico updates
  • Careers
  • Events
  • Press room
  • About us
  • Partner programs
  • Affiliate program
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Zero Trust
  • Phishing-resistant MFA
  • Passwordless
  • Cyber insurance
  • More solutions
  • Industries overview
  • Yubico blog
  • Resource library
  • Cybersecurity glossary
  • Authentication standards
  • Developer program
  • Works with YubiKey
  • Help center
  • Downloads
  • Product documentation
  • Support Services
  • Professional Services
  • Professional Services
  • Contact support
Yubico © 2023 All Rights Reserved.
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust
We use cookies to ensure that you get the best experience on our site and to present relevant content and advertising. By browsing this site without restricting the use of cookies, you consent to our and third party use of cookies as set out in our Cookie Notice.

PreferencesAccept all
Yubico Privacy and Cookies Policy

Privacy Overview

Yubico.com uses cookies to improve your experience while navigating through the website. When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually identify you, but it can give you a more personalized web experience.

Because we respect your right to privacy, you can choose not to allow some types of cookies.

Click on the different category headings to find out more and change our default settings.

Blocking some types of cookies may impact your experience on our site and the services we are able to offer.
Strictly necessary cookies
Always Enabled

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Functional cookies

These cookies enable the website to provide enhanced functionality and personalization. They may set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Performance cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Targeting cookies

These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Uncategorized

Undefined cookies are those that are being analyzed and have not been classified into a category as yet.

Matomo Anonymized Tracking
Save & Accept