Resource Category: White papers and reports

  • featured imageSecure your AWS environment phishing-resistant MFAExplore the YubiKey by Yubico for secure AWS authentication: phishing-resistant, multi-protocol support, and easy integration.Read moreAWSMFAphishing-resistant authentication
  • AWS best practice guide previewAWS Best practices guideDownload this Best Practices Guide to learn about six deployment best practices to accelerate your adoption of phishing-resistant MFA for your AWS environment at scale.Read moreAWSbest practices guidephishing-resistant MFA
  • dodModernizing authentication across the Department of Defense with phishing-resistant MFALearn how the DOD-approved and FIPS 140-2 validated YubiKey is helping the federal government with phishing-resistant multi-factor authentication (MFA) for modern use cases not supported by the PIV and CACRead moregovernmentmodern authenticationphishing-resistant authentication
  • device-bound passkeys featured imageHow to get started with passwordless using device-bound passkeys Read the Yubico deployment best practices guide to get started with device-bound passkeys for your passwordless authentication journey.Read morebest practices guidepasskeyspasswordlessYubiKey
  • Secure you Microsoft environment featured imageSafeguard your Microsoft ecosystem with a Zero Trust strategyLearn why there is a critical need for phishing-resistant MFA to support Zero Trust for Microsoft environments.Read moreMicrosoftphishing-resistant MFAYubiKeyzero trust
  • ema report passwordless feautured imageTranscending Passwords: The Next Generation of AuthenticationThe report exposes the business impact of authentication practices, with consequences for security, productivity and employee retention.Read moreauthenticationcybersecuritypasswordless
  • Yubico and Okta ebook coverYubico and Okta: Raising the bar for securityDownload the Yubico and Okta eBook to learn the importance of a strong security posture and actions you can take today to secure your organization’s future.Read morecybersecurityOktaphishing-resistant MFA
  • manufacturing user stories brochure feature page imageManufacturers across the globe are investing in modern authenticationSee real stories of how global manufacturers and other leading brands changed the game for modern enterprise authentication security.Read morecybersecuritymanufacturingsupply chainYubiKey
  • energy and natural resources best practice guide feature imageEnergy and Natural Resources Deployment Best Practices GuideLearn the six deployment best practices that can help accelerate the adoption of modern, phishing-resistant MFA at scale using the YubiKey.Read morebest practices guideenergy and natural resourcesYubiKey