Resource Category: Solution briefs
-
How to best secure your call center environments with against modern cyber threats Learn key considerations in choosing the right authentication solution for call centers. Read more -
Five ways Yubico can help you accelerate and scale phishing-resistant MFA in 2023 Learn about the 5 ways Yubico can help you accelerate and scale phishing-resistant MFA, starting now through 2023, to stop phishing, ransomware and other forms of account takeovers in their tracks. Read more -
Protecting the healthcare ecosystem with phishing-resistant MFA Learn how the YubiKey helps healthcare organizations across insurance, providers, clinicians, biotech, and pharmaceuticals drive high security against modern cyber threats and high user productivity with the best user experience Read more -
Achieve 100% MFA across state and local government Learn how state and local governments can ensure 100% MFA coverage to protect against modern cyber threats and meet cyber insurance requirements with the YubiKey. Read more -
Okta EO Ping Identity | EO 14028 compliance – Yubico Learn how you can achieve federal compliance with YubiKeys and Okta. Read more -
Microsoft | Yubico Phishing-resistant MFA for Telecoms Learn how you can achieve modern security with Microsoft Azure AD and YubiKey to bolster cyber security. Read more -
Ping Identity | EO 14028 compliance – Yubico Learn how YubiKey and Ping Identity together offer phishing-resistant MFA to protect against account takeovers within government agencies Read more -
Protecting the supply chain with modern security Learn how Yubico solutions such as the YubiKey and YubiHSM 2 can help you secure your software supply chain, ensure IP security and product integrity, and provide highest-assurance security for third party access to critical systems and data. Read more -
Strong phishing resistant MFA for EO compliance Learn how you can achieve federal compliance with YubiKeys and Microsoft Read more -
Phishing-resistant MFA for Telecoms Learn how the YubiKey can bolster existing security approaches by providing a future-proof layer of protection to safeguard people, technology, and data. Read more