Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
The Total Economic Impact Of Yubico YubiKeys Attend this webinar to learn about the latest in: – The evolving cyberthreat and compliance landscape – How to procure YubiKeys as a Service for greater business agility and predictability – The findings from the Forrester Total Economic Impact (TEI) report that showcases YubiKeys delivering 203% Return on Investment (ROI) Read more -
TEI Forrester report TY Thank you for your interest in our report, The Total Economic Impact of Yubico YubiKeys. Read more -
Ping Identity | EO 14028 compliance – Yubico Learn how YubiKey and Ping Identity together offer phishing-resistant MFA to protect against account takeovers within government agencies Read more -
WebAuthn Explained: Advancing Authentication with Hardware Security Keys & Establishing a Root of Trust – Yubico Insights Establishing a “root of trust” is the mechanism in which a user recovers an account or establishes their identity on a new device Read more -
Protecting the vote: How one northeastern U.S. state secured elections using strong MFA TY We hope you enjoy reading the Yubico case study, Protecting the Vote: How one northeastern state secured elections using strong multi-factor authentication. Read more -
One northeastern U.S. state secured elections using MFA Election security is an increasing concern. One Northeastern state adopted mfa using hardware security keys to protect its voters Read more -
Protecting the supply chain with modern security Learn how Yubico solutions such as the YubiKey and YubiHSM 2 can help you secure your software supply chain, ensure IP security and product integrity, and provide highest-assurance security for third party access to critical systems and data. Read more -
A cybersecurity roadmap for securing shared workstations Learn critical authentication requirements for shared workstations and devices, and best practices to ensure your organization stays protected against modern threats. Read more -
Best practices for securing mobile-restricted environments with MFA Attend this webinar to learn the key security best practices to secure mobile-restricted environments. Read more