Resource Category: Solution briefs
-
Manufacturing authentication compliance checklist Learn how phishing-resistant MFA can help manufacturers embrace data protection compliance with confidence. Read more -
Professional Services Deployment 360 Program Learn about Yubico’s Deployment 360 program which packages up all of the essential elements needed in getting your organization jump started on deploying YubiKeys. Read more -
Professional Services Microsoft Entra ID CBA Implementation Learn how you can enlist dedicated technical engagement designed to help you implement YubiKeys and MFA with Microsoft Entra ID Hybrid using Certificate-Based Authentication (CBA). Read more -
Professional Services Deployment Advisors Consultants Read the solution brief to learn more about how Yubico Professional Services now offers dedicated Deployment Advisors to help shepherd you through your YubiKey deployment, from planning to wrap-up. Read more -
Professional Services Microsoft Entra ID Quick Start Workshop Join us for a comprehensive review and technical tips on integrating YubiKeys with Microsoft Azure. In addition, the workshop includes best practices on operational deployment topics plus post-workshop technical consulting hours. Read more -
Professional Services YubiKey Distribution Planning Workshops Let us help you plan a comprehensive interactive workshop providing customized support in developing a plan for completing the distribution of YubiKeys across your organization. Read more -
Not all MFA is created equal: Mobile MFA lures cybercriminals Legacy MFA such as mobile authentication is highly vulnerable to phishing and other forms of account takeovers. Learn about the pitfalls of mobile MFA and best practices to stop account takeovers. Read more -
Why your one time OTP legacy MFA is setting you up for a security breach Learn how phishing-resistant MFA addresses the gaps that legacy MFA creates. Read more -
Infographic: Everything you need to know about passkeys What are passkeys? You might have heard passkeys are new. Not true! A passkey is just a FIDO credential, and those have been around for years. FIDO credentials are good at blocking phishing attacks. Why are passkeys so phishing-resistant? What’s the difference between a passkey and an authenticator? A passkey is the credential itself, a […] Read more -
How to best secure your call center environments with against modern cyber threats Learn key considerations in choosing the right authentication solution for call centers. Read more