Skip to content
English
Français
Deutsch
日本語
Español
Svenska
Contact Sales
Resellers
Support
menu
Why Yubico
expand_more
Why Yubico
How we help
Enterprises
SMBs
Individuals
Developers
Work with us
Careers
Partner programs
Connect & learn
Contact Sales
Events
Press room
About us
The team
Investors
Innovation history
Secure it Forward
Easy-to-use, secure authentication
With YubiKey there’s no tradeoff between great security and usability
Why YubiKey
2FA
security
supply chain
Proven at scale at Google
Google defends against account takeovers and reduces IT costs
Google Case Study
2FA
security
supply chain
Protecting vulnerable organizations
Secure it Forward: Yubico matches up to 5% of the number of YubiKeys purchased on Yubico.com
Secure it Forward
2FA
security
supply chain
Products
expand_more
All products
Hardware
YubiKey 5 Series
YubiKey 5 FIPS Series
YubiKey Bio Series
Security Key Series
YubiHSM 2 & YubiHSM 2 FIPS
Services
YubiKey as a Service
YubiEnterprise Delivery
Yubico Enrollment Suite
YubiCloud
Software and tools
Yubico Authenticator
Computer login tools
Software Development Toolkits
Discover the YubiKey
Using YubiKey is easy
Find the right YubiKey
Works with YubiKey
Compare YubiKeys
One key for hundreds of apps and services
YubiKey works out-of-the-box and has no client software or battery
Yubico protects you
2FA
security
supply chain
YubiKey as a Service delivers scale and savings
Gain a future-proofed solution and faster MFA rollouts
YubiKey as a Service
2FA
security
supply chain
Solutions
expand_more
Solutions overview
Initiatives
Zero Trust
Executive Order OMB M-22-09
Phishing-resistant MFA
Passwordless
Compliance
Cyber Insurance
Critical infrastructure
Secure supply chain
Protect call centers
Use cases
Hybrid & remote workers
Secure privileged users
Mobile restricted environments
Shared workstations
Technologies
Microsoft ecosystem
Salesforce workspace
IAM solutions
AWS environment
HYPR experience
Okta identity solutions
The Bridge to Passwordless
Begin the journey to make your organization passwordless
Get the white paper
2FA
security
supply chain
Accelerate your Zero Trust Strategy
7 best authentication practices to jumpstart your Zero Trust program
Get the white paper
2FA
security
supply chain
Federal cybersecurity requirements
Guidance for leaders to prepare for the modern cyber threat era
Get the white paper
2FA
security
supply chain
Industries
expand_more
Industries overview
Industries
High tech
Federal government
Department of Defense
Federal systems integrators
State & local government
Education
Financial services
Retail & hospitality
Telecommunications
Healthcare
Pharmaceuticals
Cryptocurrency
Energy & natural resources
Manufacturing
Elections & campaigns
Insurance organizations
Manufacturing and supply chain security
Authentication best practices for manufacturing
Get the white paper
2FA
security
supply chain
Phishing-resistant MFA: Fact vs. Fiction
Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines
Get the white paper
2FA
security
supply chain
Secure energy and natural resources from cyber threats
Best practices for phishing-resistant MFA to protect infrastructure
Get the white paper
2FA
security
supply chain
Resources
expand_more
All resources
Learn
Yubico Blog
Cybersecurity glossary
Authentication standards
Resource library
Developer program
Product briefs
Solution briefs
Passkeys
Best practices
Case studies
Get a pilot started
White papers and reports
Webinars
BeyondTrust: secured with a subscription
Privileged Access Management leader simplifies deployment
See case study
2FA
security
supply chain
S&P Global Market Intelligence report: old habits die hard
Only 46% of orgs protect their applications with MFA. How about yours?
Read the report
2FA
security
supply chain
Considering Passkeys for your Enterprise?
Learn how to avoid common passkey pitfalls
Visit Passkey Hub
2FA
security
supply chain
Support
expand_more
Support home
Get started
Find the right YubiKey
Set up your YubiKey
Downloads
Product documentation
Support articles
Services
Support Services
Professional Services
YubiKey as a Service
Additional resources
Works with YubiKey Program
Buying and shipping information
Security advisories
Help center
How to set up your YubiKey
Follow our guided tutorials to start protecting your services
Set up your YubiKey
2FA
security
supply chain
Find the best YubiKey for your needs
Take the guided quiz and see which YubiKeys fit your needs
Take the quiz
2FA
security
supply chain
Accelerate your YubiKey deployment
Technical and operational guidance for your YubiKey rollout
Professional Services
2FA
security
supply chain
Search
Subscribe
Store
Watch now
Watch now