• Drive business continuity and cyber resilience with modern FIDO security keys

    Download the briefDownload the brief

    Ensure business continuity and cyber resilience with phishing-resistant users

    Half of organizations have suffered a cyber attack or incident that prevented access to data in 2023.1 While cyber attacks are the biggest cause of outages, business continuity also suffers when there’s an issue with your infrastructure, application software, cloud resources, and more. With most cyber attacks, malicious actors don’t break in, they log in—using stolen credentials acquired through phishing.

    It is imperative that organizations deploy highest-assurance, phishing-resistant authentication across the entire user lifecycle, including registration, authentication and recovery processes, to create phishing-resistant users.

    How do you create phishing-resistant users?

    Choosing the best FIDO approach:

    Based on NIST guidelines, currently only multi-factor authentication (MFA) based on Smart Card or FIDO2 (passkeys) is considered phishing resistant. And if you are going the FIDO route, depending on the FIDO authenticator you choose, it can also help you maintain business continuity in a variety of scenarios.

    FIDO solutions such as platform authenticators (i.e. fingerprint scanners built into devices) may provide all the perceived security you need most of the time. But there are use cases where it isn’t enough. If you are like most people you want to authenticate from many devices. Each of these devices would need to register and securely store the passkey which can be time consuming and difficult to remember where all the passkeys are stored.

    To have the highest level of assurance, passkeys need to be stored in hardware-based secure elements. Leveraging a security key to authenticate across all your devices allows you to be productive while providing the highest level of security. Plus, FIDO hardware security keys offer portability which drives productivity for users that use multiple devices and doesn’t leave credentials on all the devices that a user has used in the pastTo have the highest level of assurance, passkeys need to be stored in hardware-based secure elements. Leveraging a security key to authenticate across all your devices allows you to be productive while providing the highest level of security. Plus, FIDO hardware security keys offer portability which drives productivity for users that use multiple devices and doesn’t leave credentials on all the devices that a user has used in the past.

    Download the briefDownload the brief

    Always-on enterprises with the phishing-resistant YubiKey

    The YubiKey is a modern multi-protocol hardware security key supporting Smart Card (PIV) and FIDO, that contains the highest-assurance passkeys for phishing-resistant MFA, and passwordless authentication at scale. Rest assured that with the YubiKey you deploy the most secure passkey strategy: device-bound that is purpose-built for security, Authenticator Assurance Level 3 (AAL3) compliant, and FIPS 140-2 Level 2 and Level 3 validated.

    Because the YubiKey doesn’t need regular firmware patches, batteries, or even an internet connection to work, it’s always-on to keep your business running—helping you to be cyber resilient. Even if your employees don’t use their YubiKey every day, having one available enables them to securely log on to perform their daily tasks, until they are re-registered across all services.

    The YubiKey supports business continuity and enables cyber resilience across common business scenarios to keep your employees and your business secure and up and running 24×7:


    Privileged users
    Engineers, IT and security admins, C-Suite, HR, finance, and sales


    Remote staff

    office workers, & field technicians


    Users across supply chain

    Contractors, contract service workers, secondees and joint ventures

    Shared workstation environments

    OT and mobile-restricted environments

    Customer accounts

    Whether you are securing employees in an industrial environment or corporate office, or protecting a sea of external vendors or high-value customers, with the YubiKey you can secure user access and accounts for anyone, anywhere and across any industry. You are cultivating phishing-resistant users.


    “Attackers see value in gaining access to any Datadog account. Deploying YubiKeys at scale gives us the trust and peace of mind that only our employees are able to access our systems.”

    Daniel JacobsonSenior Director of IT

    “Proactively securing our global supply chain was an important step as properly tested and approved products are counted on by our customers who buy and deploy them.”

    Chad LloydDirector of Cybersecurity Architecture for Energy Management
    Download the briefDownload the brief