Skip to content
English
Français
Deutsch
日本語
Español
Svenska
Contact Sales
Resellers
Support
About
Products
Enterprise
Resources
Solutions
0
All YubiKeys
Compare YubiKeys
What is a YubiKey?
Set up your YubiKey
YubiKey 5 Series
Learn More
Buy
YubiKey 5 FIPS Series
Learn more
Buy
YubiKey Bio Series
Learn more
Buy
Security Key Series
Learn more
Buy
YubiHSM 2 & YubiHSM 2 FIPS
Learn more
Buy
Accessories
Learn more
Buy
Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
Home
»
Resources
»
Resource library
All Categories
Product briefs
Solution briefs
Webinars
White papers and reports
Filter
AI
APIs
AWS
Active Directory
Axiad
Azure AD
C-Suite
CAC
CBA
CISO
CJIS
Centrify
DORA
Device-bound passkeys
Duo security
Earth Day
Enterprise
Executive Order
FIDO
FIDO U2F security key
FIDO2
FIPS 140-2
Google
HYPR
Holiday
Java
MFA
MFA mandates
Microsoft
Microsoft 365
Microsoft Azure
OMB Memo-22-09
OTP
Okta
PCI DSS
PIV
Pharma
Ping Identity
Public Sector
RSA
Report
Telecommunication
Telecoms
WebAuthn
Works with YubiKey
YubiEnterprise
YubiEnterprise Delivery
YubiEnterprise Subscription
YubiHSM
YubiHSM 2
YubiKey
YubiKey 5
YubiKey 5.7
YubiKey 5ci
YubiKey Bio
YubiKey FIPS Series
YubiKey as a Service
YubiKeys
Yubico
Yubico FIDO Pre-reg
account takeovers
authentication
banking
best practices
best practices guide
biometrics
call center
compliance
covid-19
critical infrastructure
cryptography
cyber insurance
cyber resilience
cyberattack
cybersecurity
deployment
digital transformation
education
elections and political campaigns
energy
energy and natural resources
enterprise authentication
enterprise security
federal government
federal systems integrators
financial services
getting started
government
hardware
healthcare
high-tech
identity and access management
insurance
manufacturers
manufacturing
mobile authentication
mobile-restricted
modern authentication
modern cyber threats
modernize mfa
multifactor authentication
nis2
oil and gas
passkey
passkeys
passwordless
phishing
phishing-resistant MFA
phishing-resistant authentication
phishing-resistant users
privileged users
professional services
ransomware
regulation
remote and hybrid workers
remote workers
retail and hospitality
root of trust
securing critical infrastructure
security
security key
shared workstation
shared workstations
smart card
smb
state and local government
stop account takeovers
strong MFA
strong authentication
subscription
supply chain
user authentication
work-from-home
wwyk
yubico services
zero trust
Best practices to secure call centers with phishing-resistant MFA
Join Yubico for a roundtable discussion to learn phishing-resistant MFA and deployment best practices for call centers, gathered from numerous global deployments across critical industries such as financial services, healthcare, hospitality, retail, technology and others.
Read more
Securing call centers with phishing-resistant MFA
Read the white paper to learn how to secure your call center environments against phishing and account takeovers using the phishing-resistant YubiKey
Read more
How to best secure your call center environments with against modern cyber threats
Learn key considerations in choosing the right authentication solution for call centers.
Read more
Ping Identity | EO 14028 compliance – Yubico
Learn how YubiKey and Ping Identity together offer phishing-resistant MFA to protect against account takeovers within government agencies
Read more
Strong phishing resistant MFA for EO compliance
Learn how you can achieve federal compliance with YubiKeys and Microsoft
Read more
The future of Federal cybersecurity is here
Smart cards, while they provide strong security, can be complex for to adopt both for the organization and the end users alike. Users may even have to carry smart card readers and additional peripherals to use the solution. Read this solution to understand how a modern and simplified smart card approach can augment your existing smart card strategy and provide strong phishing defense in the modern cyber threat landscape. All while being very well suited for your hybrid or remote workforce, with users working across a range of modern desktops, tablets and smart phones.
Read more
Securing federal government with phishing-resistant MFA
Join to hear from government executives on how they are planning for OMB M-22-09, to ensure the highest protection for mobile, cloud platforms and systems that don’t support PIV and CAC
Read more
Meeting Zero Trust and phishing-resistant MFA requirements
Learn how the YubiKey meets phishing-resistant MFA requirements mandated by OMB M-22-09
Read more
March 2020 State of Contact Center Technology
Review of the most urgent contact center objectives and opportunities for technology.
Read more
See More