Skip to content
English
Français
Deutsch
日本語
Español
Svenska
Contact Sales
Resellers
Support
About
Products
Enterprise
Resources
Solutions
0
All YubiKeys
Compare YubiKeys
What is a YubiKey?
Set up your YubiKey
YubiKey 5 Series
Learn More
Buy
YubiKey 5 FIPS Series
Learn more
Buy
YubiKey Bio Series
Learn more
Buy
Security Key Series
Learn more
Buy
YubiHSM 2 & YubiHSM 2 FIPS
Learn more
Buy
Accessories
Learn more
Buy
Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
Home
»
Resources
»
Resource library
All Categories
Product briefs
Solution briefs
Webinars
White papers and reports
Filter
AI
APIs
AWS
Active Directory
Axiad
Azure AD
C-Suite
CAC
CBA
CISO
CJIS
Centrify
DORA
Device-bound passkeys
Duo security
Earth Day
Enterprise
Executive Order
FIDO
FIDO U2F security key
FIDO2
FIPS 140-2
Google
HYPR
Holiday
Java
MFA
MFA mandates
Microsoft
Microsoft 365
Microsoft Azure
OMB Memo-22-09
OTP
Okta
PCI DSS
PIV
Pharma
Ping Identity
Public Sector
RSA
Report
Telecommunication
Telecoms
WebAuthn
Works with YubiKey
YubiEnterprise
YubiEnterprise Delivery
YubiEnterprise Subscription
YubiHSM
YubiHSM 2
YubiKey
YubiKey 5
YubiKey 5.7
YubiKey 5ci
YubiKey Bio
YubiKey FIPS Series
YubiKey as a Service
YubiKeys
Yubico
Yubico FIDO Pre-reg
account takeovers
authentication
banking
best practices
best practices guide
biometrics
call center
compliance
covid-19
critical infrastructure
cryptography
cyber insurance
cyber resilience
cyberattack
cybersecurity
deployment
digital transformation
education
elections and political campaigns
energy
energy and natural resources
enterprise authentication
enterprise security
federal government
federal systems integrators
financial services
getting started
government
hardware
healthcare
high-tech
identity and access management
insurance
manufacturers
manufacturing
mobile authentication
mobile-restricted
modern authentication
modern cyber threats
modernize mfa
multifactor authentication
nis2
oil and gas
passkey
passkeys
passwordless
phishing
phishing-resistant MFA
phishing-resistant authentication
phishing-resistant users
privileged users
professional services
ransomware
regulation
remote and hybrid workers
remote workers
retail and hospitality
root of trust
securing critical infrastructure
security
security key
shared workstation
shared workstations
smart card
smb
state and local government
stop account takeovers
strong MFA
strong authentication
subscription
supply chain
user authentication
work-from-home
wwyk
yubico services
zero trust
Beyond passwords: How Okta secured their global workforce with Yubico
Join Yubico and Okta to learn first-hand about some of the challenges that Okta faced and why they chose Yubico as their partner to deliver a large-scale, global, solution with the highest level of phishing-resistant assurance.
Read more
Phishing-Resistant Security: Okta’s Early Adoption of Yubico FIDO Pre-reg
Download this free infographic to learn more about how Okta became an early adopter of Yubico FIDO Pre-reg, deploying YubiKeys to its entire global workforce to establish an end-to-end phishing-resistant authentication experience.
Read more
How to create phishing-resistant users with fast, out-of-the box YubiKey FIDO activation with Okta
Get started on building phishing-resistant security with Yubico FIDO Pre-reg and Okta! For a successful YubiKey deployment, download the guide. This resource outlines a six-step process covering planning, validation, integration, launch, adoption, and success measurement—providing essential strategies to help organizations enhance security and operational efficiency with phishing-resistant MFA.
Read more
Securing federal systems integrators and the defense industrial base with modern authentication
FSIs have access to critical systems and hold large volumes of sensitive and Controlled Unclassified Information (CUI), making them targets of sophisticated cyber attacks. Any MFA is better than a password, but not all MFA is created equal. Download the visual industry brief to learn how FSIs and the DIB can protect themselves with modern, phishing-resistant multi-factor authentication (MFA).
Read more
Meeting the Sept 2024 White House phishing-resistant MFA deadline
Learn best practices from government executives on their agencies’ journeys, how they navigated challenges and pitfalls to achieve compliance and what steps your agency can take right now to show intent and progress toward phishing-resistant MFA.
Read more
Securing Federal Systems Integrators with modern authentication
Learn how Federal Systems Integrators (FSIs) can modernize their authentication stack and create phishing-resistant users and systems to protect against modern cyber threats.
Read more
Enhancing Federal Cybersecurity
Explore our infographic on YubiKey’s phishing-resistant multi-factor authentication (MFA) solutions tailored for the federal government.
Read more
Yubico|Microsoft: On-the-go enterprise authentication, at speed and scale
Learn more about the current cybersecurity landscape and how collaborations like the one between Yubico and Microsoft play a crucial role in driving the adoption of standards and technologies that raise the bar for enterprise security.
Read more
Secure your AWS environment with highest-assurance phishing-resistant MFA
Download the best practice guide to learn more how you can stop account takeovers and go passwordless for a wide variety of AWS use cases
Read more
See More