Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Where Productivity Meets Security: Passwordless for Retail and Hospitality Stop POS Compromises and Empower Your Front-Line Staff In the fast-paced world of retail and hospitality, every second spent dealing with a login is a second taken away from a guest. True productivity happens when security makes a staff member’s life easier, allowing them to prioritize the guest standing in front of them. But shared […] Read more -
Securing Operational Technology with Yubico How expanded connectivity is reshaping cyber risk in operational technology Operational Technology (OT) supports critical infrastructure including manufacturing, energy, healthcare, and government. These OT environments consist of large-scale machines and Industrial Control Systems (ICS), including Distributed Control Systems and SCADA, to manage physical processes including machine-to-machine and human-to-machine communication. Historically, these environments were designed to […] Read more -
Accelerate your Zero Trust strategy with modern phishing-resistant MFA What is Zero Trust? A Zero Trust framework implies that an organization should trust no individual or thing unless properly verified, before being given access to the network and data. Zero Trust means you can trust no one and no thing—not the user, not the computer, and not the communication. Authentication is a core component […] Read more -
The ROI of Phishing-Resistance: A Total Economic Impact Study If you’re evaluating stronger authentication, the question isn’t “Does it improve security? The real question is: Does it deliver measurable business value and do you have a partner you can actually trust to execute? That’s exactly what we set out to answer in our commissioned study conducted by Forrester Consulting, The Total Economic Impact™ of […] Read more -
Beyond the login: Lifecycle management and application control You have or are looking to adopt the YubiKey to eliminate phishing and secure the front door—but true Zero Trust doesn’t stop at login. To unlock the full potential of hardware-backed security, organizations need a strategy that bridges the gap between physical authentication, daily operations, and continuous enforcement. Join Yubico and Appterix for a deep […] Read more -
TEI Report 2026 Reduced Risk, Savings, And Business Growth Enabled By YubiKeys Read more -
Entdecke mit Yubico und EgoMind die Zukunft der Authentifizierung! Hacker hacken nicht mehr, sie loggen sich ein. Read more -
Banking on Trust: Rethinking authentication in the new era of AI In an era of Gen AI, traditional authentication methods are no longer enough—sophisticated threat actors are exploiting vulnerabilities faster than ever, and both employees and customers are potential entry points. Read more -
Simplify FIDO2 key management with Microsoft Entra ID, Intercede, and Yubico By the end of this webinar, you will be equipped with the knowledge to confidently comply with the highest identity and authentication standards. Read more