Secure Energy and Natural Resources from cyberattacks
Stop account takeovers, drive compliance, and go passwordless
Modern, phishing-resistant authentication at scale
for energy, utilities, oil and gas
The YubiKey provides modern, phishing-resistant authentication at scale across legacy and modern Informational Technology (IT) and Operational Technology (OT) environments. Energy, utilities, and oil and gas entities can implement robust, easy-to-use authentication with the YubiKey, that secures critical applications, data, and infrastructure against ransomware attacks and other cyber threats that cause operational disruption to critical infrastructure.
Webinar: Modernizing authentication across energy and natural resources to stop modern cyber threats
Learn best practices to modernize cybersecurity across your critical IT and OT environments with Yubico solutions, to stop modern cyber threats and drive cyber insurance hygiene.
Secure IT and OT environments with phishing-resistant MFA
With critical systems and applications located across corporate environments, field environments, and remote locations, you need a cohesive and effective way to ensure your entire IT and OT environment is protected against unauthorized access. Legacy authentication such as usernames and passwords and mobile-based authenticators are highly susceptible to modern cyber threats.
YubiKeys offer phishing-resistant two-factor, multi-factor, and passwordless authentication and work across legacy and modern IT and OT environments with multi-protocol support for OTP, Smartcard, FIDO U2F, FIDO2/WebAuthn, and OpenPGP. Secrets are stored in the secure element on the hardware security key and cannot be exfiltrated, unlike legacy MFA approaches. YubiKeys integrate seamlessly with existing IAM solutions such as Microsoft, Okta, Duo and Ping, while providing secure authentication for hundreds of applications and services.
High durability for shared workstations, mobile-restricted environments and isolated networks
In addition to offering low security, legacy authentication methods such as mobile-based authenticators aren’t suitable for mobile-restricted environments or isolated networks (air-gapped, SCADA), and are burdensome for field workers to carry in OT environments and remote locations such as plants, off-shore rigs, and remote vessels.
Yubikeys come in an ultra portable USB form factor, offering a portable root of trust for field workers and employees in mobile-restricted and shared workstation environments. YubiKeys provide robust security across OT environments—they don’t require a battery or cellular connectivity, and are highly durable (IP68 certified)— dust proof, crush resistant, and water resistant. YubiKeys with NFC capability are ideal for use in ‘no spark’ or low voltage device environments.
Securing energy and natural resources against modern cyber threats
Learn the critical need for phishing-resistant multi-factor authentication (MFA) to safeguard this critical infrastructure.
“One of the most common attack vectors in the power sector is phishing, or attacks launched via email asking users to click on a link that then injects malware into their systems, or via email asking for personal data to enable unauthorized network access.”
Drive compliance to industry regulations
The 2021 Colonial Pipeline hack led to an evolving compliance landscape including the White House Cybersecurity Executive Order #14028 mandating Zero Trust and impersonation-resistant MFA, and the TSA Security Directives 2021-01 and 2021-02 for Pipeline owners and operators, to implement special mitigation measures to protect against ransomware and other cyber threats.
The FIPS 140-2 validated YubiKey is impersonation resistant and highly suitable for regulated environments. It meets NIST SP 800-63B Authenticator Assurance Level (AAL) 3 requirements, enabling energy, utilities, and oil and gas entities to comply with EO #14028, the TSA Security Directives, and other government regulations like Sarbanes-Oxley (SOX), the Federal Energy Regulation Commission (FERC), and North American Electric Reliability Commission (NERC) Critical Infrastructure Protection Standards.
Secure your supply chain
Reliance on supply chain vendors and outsourced partners require critical IP handoffs that can result in major vulnerabilities if your supply chain doesn’t follow the same Zero Trust and strong MFA approach. Weak links in the chain can lead to costly consequences such as disruption to normal operation, and national and regional critical infrastructure outages.
Ensuring that your supply chain vendors and partners deploy strong MFA helps minimize your cyber risk, liability, and damage to your brand reputation. The YubiKey offers secure, convenient, and scalable security making it easy for you and your supply chain vendors to deploy strong authentication. With YubiEnterprise Delivery from Yubico, it’s easy for your supply chain to get security keys directly into the hands of their users.
Protecting the supply chain with highest-assurance security
Learn authentication best practices in securing supply chain integrity.
Learn more about the YubiKey
Risk reduction, business growth, and efficiency enabled by YubiKeys
Read the Forrester Consulting study commissioned by Yubico and see how a composite organization reduced risk by 99.9%, saw a drop in password-related helpdesk tickets by 75%, and experienced a 203% 3-year ROI with YubiKeys.
YubiEnterprise Subscription: peace of mind and flexibility for less than a cup of coffee per user/month
YubiEnterprise Subscription simplifies purchase and support while also providing financial benefits. Estimate your potential savings as compared to one-time perpetual purchasing model