Skip to content
  • Contact Sales
  • Resellers
  • Support
Yubico Logo
0

All YubiKeys Compare YubiKeys What is a YubiKey? Set up your YubiKey

YubiKey 5 Series

Learn More Buy

YubiKey 5 FIPS Series

Learn more Buy

YubiKey Bio Series

Learn more Buy

Security Key Series

Learn more Buy

YubiHSM 2 & YubiHSM 2 FIPS

Learn more Buy

Accessories

Learn more Buy

  • Resources

    Browse our library of white papers, webinars, case studies, product briefs, and more.
    Home » Resources » Resource library
    • All Categories
    • Product briefs
    • Solution briefs
    • Webinars
    • White papers and reports
    AI APIs AWS Active Directory Axiad Azure AD C-Suite CAC CBA CISO CJIS Centrify DORA Device-bound passkeys Duo security Earth Day Enterprise Executive Order FIDO FIDO U2F security key FIDO2 FIPS 140-2 Google HYPR Holiday Java MFA MFA mandates Microsoft Microsoft 365 Microsoft Azure OMB Memo-22-09 OTP Okta PCI DSS PIV Pharma Ping Identity Public Sector RSA Report Telecommunication Telecoms WebAuthn Works with YubiKey YubiEnterprise YubiEnterprise Delivery YubiEnterprise Subscription YubiHSM YubiHSM 2 YubiKey YubiKey 5 YubiKey 5.7 YubiKey 5ci YubiKey Bio YubiKey FIPS Series YubiKey as a Service YubiKeys Yubico Yubico FIDO Pre-reg account takeovers authentication banking best practices best practices guide biometrics call center compliance covid-19 critical infrastructure cryptography cyber insurance cyber resilience cyberattack cybersecurity deployment digital transformation education elections and political campaigns energy energy and natural resources enterprise authentication enterprise security federal government federal systems integrators financial services getting started government hardware healthcare high-tech identity and access management insurance manufacturers manufacturing mobile authentication mobile-restricted modern authentication modern cyber threats modernize mfa multifactor authentication nis2 oil and gas passkey passkeys passwordless phishing phishing-resistant MFA phishing-resistant authentication phishing-resistant users privileged users professional services ransomware regulation remote and hybrid workers remote workers retail and hospitality root of trust securing critical infrastructure security security key shared workstation shared workstations smart card smb state and local government stop account takeovers strong MFA strong authentication subscription supply chain user authentication work-from-home wwyk yubico services zero trust
    Beyond passwords: How Okta secured their global workforce with Yubico webinar cover image Beyond passwords: How Okta secured their global workforce with Yubico Join Yubico and Okta to learn first-hand about some of the challenges that Okta faced and why they chose Yubico as their partner to deliver a large-scale, global, solution with the highest level of phishing-resistant assurance. Read more Yubico and Okta infographic cover image Phishing-Resistant Security: Okta’s Early Adoption of Yubico FIDO Pre-reg Download this free infographic to learn more about how Okta became an early adopter of Yubico FIDO Pre-reg, deploying YubiKeys to its entire global workforce to establish an end-to-end phishing-resistant authentication experience. Read more Remaining cyber resilient: Top recommendations for 2025 webinar cover image Remaining cyber resilient: Top recommendations for 2025 With 2024 soon to be in the rear view mirror, prepare for a safe 2025 by attending this webinar to learn what organizations and individuals should be prioritizing to become phishing-resistant users and become cyber resilient against an ever evolving cyber threat landscape. Read more Yubico FIDO pre-reg with Okta best practice guide preview How to create phishing-resistant users with fast, out-of-the box YubiKey FIDO activation with Okta Get started on building phishing-resistant security with Yubico FIDO Pre-reg and Okta! For a successful YubiKey deployment, download the guide. This resource outlines a six-step process covering planning, validation, integration, launch, adoption, and success measurement—providing essential strategies to help organizations enhance security and operational efficiency with phishing-resistant MFA. Read more Modern authentication for the Army Download the free brochure to learn how the YubiKey solves U.S. Army authentication modernization use cases. Read more Build robust cybersecurity postures with cyber insurance & modern authentication webinar cover Build robust cybersecurity postures with cyber insurance & modern authentication Brent Deterding, CISO, Afni and Davis Hake, Co-founder, Insurtech, discuss the current cybersecurity and cyber insurance landscape and how leaders of today and tomorrow should be planning for the new age of cyber offense without breaking the bank. Read more Transform Zero Trust featured image CISOs: Transform Zero Trust to an organization-wide priority Learn why every CISO’s Zero Trust strategy should start with phishing-resistant MFA. Read more CFOs: Lower cyber insurance premiums with phishing-resistant MFA Discover how CFOs can strengthen cybersecurity and significantly lower cyber insurance costs with Yubico’s phishing-resistant MFA. Read more Securing critical infrastructure white paper cover image Securing the world’s critical infrastructure against modern cyber threats Learn how to safeguard IT/OT systems and the supply chain with Zero Trust using phishing-resistant MFA and hardware-backed security. Read more See More

Join our newsletter

Distributed monthly, it includes product news, new applications, case studies, events, and discounts. Unsubscribe anytime.

By subscribing you agree to our Privacy Policy.
Subscribe
About us The team Innovation history Secure it forward program Yubico blog Press Room Events Partner programs Careers Investors
YubiKey 5 Series YubiKey 5 FIPS Series Security Key Series YubiKey Bio Series YubiHSM 2 & YubiHSM 2 FIPS Accessories Yubico Authenticator Computer login tools Software Development kits
YubiKey as a Service YubiEnterprise Delivery Contact Sales Yubico Enrollment Suite Professional Services
All Solutions Initiatives Industries Use cases Technologies
Setting up your YubiKey Find the right YubiKey Works with YubiKey Catalog What is a YubiKey Case studies Webinars White papers and reports Documentation All downloads Support Home Support services Buying and shipping information
LinkedIn YouTube Instagram X Facebook
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Terms of use
Yubico 2025 All Rights Reserved.