• Kontakta säljavdelningen
  • Förteckning över återförsäljare
Yubico Header Text LogoYubico Header Text Logo
Varför välja Yubicoexpand_more
  • Företag
  • Privatpersoner
  • Om regelefterlevnad
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and useability

Why YubiKey (Engelska)
  • account takeovers
  • remote workers
  • strong authentication
Google försvarar sig mot kontotjuvar och minskar IT-kostnader

YubiKeys skyddar Google-anställda sedan 2009

Läs fallstudien
  • account takeovers
  • remote workers
  • strong authentication
Protecting vulnerable organizations

One YubiKey donated for every 20 sold

Läs mer (Engelska)
  • account takeovers
  • remote workers
  • strong authentication
Produkterexpand_more
  • YubiKey
  • Jämför produkter (EN)
YubiKey 5 Serien

Säkerhetsnyckeln med stöd för flera protokoll

Läs mer
  • account takeovers
  • remote workers
  • strong authentication
YubiKey för mobilen

Ger mobilanvändare stark autentisering samtidigt som IT-kostnaderna sänks

Läs mer
  • account takeovers
  • remote workers
  • strong authentication
Var köper jag denexpand_more
  • Inköps- och leveransinformation
Passwordless med FIDO2 och WebAuthn
Read the White Paper
  • account takeovers
  • remote workers
  • strong authentication
CERN utvecklar YubiKeys för att skydda administrationskonton och servertillgån
Read the Case Study
  • account takeovers
  • remote workers
  • strong authentication
Arvika kommun ökar säkerheten och genomgår digital omvandling inom utbildningssektorn med YubiKeys
Read the Case Study
  • account takeovers
  • remote workers
  • strong authentication
Resurserexpand_more
  • Produktbeskrivningar
  • Lösningsbeskrivning
  • Vitbok
  • Blog
  • Våra kunder (EN)
Secure mobile-restricted environments

Learn about best practices to secure work spaces where users can’t, don’t or won’t use mobile devices

Download the White Paper (in English)
  • account takeovers
  • remote workers
  • strong authentication
Nätfiskeskyddat MFA för dina hybrid- och distansarbetande medarbetare

Fem steg för att öka säkerheten och produktiviteten

Read the Solution Brief
  • account takeovers
  • remote workers
  • strong authentication
Secure shared workstations against cyber threats

Shared workstation environments can be secured with phishing-resistant MFA

Download the White Paper (in English)
  • account takeovers
  • remote workers
  • strong authentication
Företagexpand_more
  • Vitbok
How to Set up your YubiKey

Follow our guided tutorials.

Set up your YubiKey (in English)
  • account takeovers
  • remote workers
  • strong authentication
Find the best YubiKey for your needs

Take the quiz.

Take the quiz (in English)
  • account takeovers
  • remote workers
  • strong authentication
Accelerate your YubiKey deployment

Technical and operational guidance.

Professional Services (in English)
  • account takeovers
  • remote workers
  • strong authentication
SubscribeStore
  • Home » Phishing-resistant authentication for hybrid and remote workers

    Phishing-resistant MFA for your hybrid and remote workforce

    Drive productivity while ensuring strong security

    Read the solution brief

    Home » Phishing-resistant authentication for hybrid and remote workers

    Secure hybrid and remote workers against cyber security threats

    Yubico helps organizations of all sizes modernize workplace login and minimize cyber risk for hybrid and remote workers with the YubiKey, by providing phishing-resistant MFA access to business applications across employee and personal devices. YubiKeys offer the highest assurance security and the best user experience, helping organizations drive high productivity while protecting your employees against phishing attacks and account takeovers.

    Learn how Professional Services can help facilitate your remote workforce deployment

    Watch the webinar

    With employees geographically dispersed perimeter security and legacy forms of authentication are no longer adequate for protection. 

    Learn best practices to secure your workforce with phishing-resistant MFA.

    Watch now

    Enable secure MFA access for IAM and IDP platforms

    Most leading hybrid and cloud environments leverage Identity and Access Management (IAM) and Identity Provider (IDP) platforms to enable employees to work without the hassle of multiple usernames and passwords. Using multi-factor authentication (MFA) with these services will enhance your security posture.

    Enhance security across your entire organization by turning on phishing-resistant MFA with the YubiKey. Leading IAM platforms such as Axiad, Duo, Google Cloud, Microsoft Azure Active Directory, Okta Workforce Identity, OneLogin, Ping Identity platform and RSA SecurIDⓇ Suite natively support YubiKeys, and can be used for Single Single On (SSO) to messaging and video conferencing apps such as Microsoft Teams, Google Hangouts and Zoom.

    Learn more about YubiKey integrations

    Source: Google
    Protect hybrid and remote workers against account takeovers

    Two-factor authentication methods such as one-time passcodes and on-device prompts are tied to mobile devices and can be compromised by malware and SIM-swapping. Research by Google, NYU, and UCSD based on 350,000 real-world hijacking attempts has proven that SMS and mobile authenticators are not very effective in preventing account takeovers and targeted attacks.

    Protect hybrid and remote workers against account takeovers by replacing mobile authenticators and SMS with the the YubiKey. YubiKeys leverage FIDO2 and WebAuthn open authentication standards to provide the highest level of security assurance that protect your workers against phishing and man-in-the middle attacks.

    Secure remote access technologies with MFA

    Connecting via Virtual Private Networks (VPN) or Identity-Aware Proxies (IAP) to access corporate networks, protected resources or specific applications from unsecured home or public wifi can be risky if they are using legacy forms of authentication.  

    The YubiKey secures remote access by enabling phishing-resistant 2FA or MFA for leading VPN applications such as Pulse Secure and Cisco AnyConnect, as well as other remote access applications, using smartcard (PIV), one-time password (OTP), FIDO U2F, or FIDO2 capabilities.

    “We were looking to add another layer of security to our POS offerings and previously the only option was 2FA via a phone call. With YubiKeys we were able to get the extra security benefits we needed at the touch of a button. It’s also a highly secure solution for remote employee access”.
    Ryan ParksMarketing Manager, Retail Control Systems
    Protect computer login with MFA

    If employee laptops are not secured properly, they can provide entry points for external threats leading to a security breach, which can have financial, legal and reputational repercussions for your business.

    YubiKeys secure computer logins, protecting on-device applications and critical business data. Multiple login options include authentication for Macs and Windows computers including those connected via Azure Active Directory, Active Directory and Microsoft Accounts. One of the most effective ways to secure computer access is to leverage the YubiKey smart card functionality, requiring a YubiKey and a PIN.


    Step-up authentication for password managers

    Passwords are still the most used authentication method according to a recent SANS Report on password management and 2FA. Almost 100% of the respondents indicated that passwords are in use, even though passwords are susceptible to phishing attacks. Having phishing-resistant 2FA or MFA is very important to protect your employees and infrastructure.

    The YubiKey integrates with several enterprise-grade password managers including 1Password, Dashlane, Keeper Security, LastPass, and more, ensuring that lax password management policies don’t cause a security breach.

    Secure & portable authenticator app

    Many of the services or applications used internally may support time-based one-time passcodes (OTPs) — such as Google Authenticator, Microsoft Authenticator, or Authy — as a two-factor authentication method.

    You can enhance phone-based one-time passcode authentication with the Yubico Authenticator, a cross-platform authenticator app that improves security and portability by storing TOTP secrets on the YubiKey and not on the mobile phone. This allows users to generate the OTP codes within the app by inserting or tapping the YubiKey to a device. Yubico authenticator is compatible with iOS, Android, PC and Mac.

    Secure SSH authentication keys

    SSH credentials used to access business servers are high value targets for hackers, as they are used by developers and systems administrators who may have higher access levels to critical systems and data. Storing SSH private keys on local devices leaves them at risk of being stolen. Additionally, manually typing OTP codes for MFA slows down access times and productivity as it takes users away from their workflows.

    SSH users can authenticate to remote systems using private keys stored securely on a YubiKey. Storing SSH private keys on a YubiKey ensures that they cannot be copied, stolen remotely or accessed by malware on the device. Using YubiKeys also offers greater convenience and faster logins – with a single touch users are securely authenticated. YubiKeys can work with SSH with a variety of authentication protocols including OpenPGP, PIV, FIDO U2F, or OTP.


    Works with YubiKey: Modernizing Workplace Login

    Discover the services that help secure your hybrid and remote workforce

    microsoft logo
    okta logo
    Search the catalog

    Remote and hybrid MFA in action

    Securing hybrid and remote workers can get complex. The YubiKey’s phishing-resistant authentication enables employees to be productive while staying secure.


    Risk reduction, business growth, and efficiency enabled by YubiKeys

    A recent Forrester Consulting Total Economic Impact™ (TEI) study commissioned by Yubico found that a composite organization representative of interviewed customers who use YubiKeys reduced risk of successful phishing and credential theft attacks by 99.9%, saw a drop in password-related helpdesk tickets by 75%, and experienced a 203% 3-year ROI with YubiKeys.

    BUT…. all organizations are different. Enter your own company data to create a custom Dynamic TEI study and instantly see how Yubico’s solutions can help your organization!

    Create my custom study
    TEI Forrester report

    YubiEnterprise Subscription: peace of mind and flexibility for less than a cup of coffee per user/month

    YubiEnterprise Subscription simplifies purchase and support while also providing financial benefits. Estimate your potential savings as compared to one-time perpetual purchasing model


    Get started

    YubiKey 5 series
    Find the right YubiKey

    Contact our sales team for a personalized assessment of your company’s needs.

    Contact sales
    Get protected today

    Browse our online store today and buy the right YubiKey for you.

    Shop now

Yubico Footer Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Instagram
  • YouTube
  • GitHub
  • Produkt sökare frågesport
  • Setup
  • Köp online
  • Företag
  • Privatpersoner
  • Om regelefterlevnad
  • Om regelefterlevnad
  • YubiKey
  • Inköps- och leveransinformation
  • Vitbok
Yubico © 2023 Med ensamrätt.
  • Sitemap
  • Cookies
  • Juridik
  • Sekretess
  • Användarvillkor
We use cookies to ensure that you get the best experience on our site and to present relevant content and advertising. By browsing this site without restricting the use of cookies, you consent to our and third party use of cookies as set out in our Cookie Notice.

PreferencesAccept all
Yubico Privacy and Cookies Policy

Privacy Overview

Yubico.com uses cookies to improve your experience while navigating through the website. When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually identify you, but it can give you a more personalized web experience.

Because we respect your right to privacy, you can choose not to allow some types of cookies.

Click on the different category headings to find out more and change our default settings.

Blocking some types of cookies may impact your experience on our site and the services we are able to offer.
Spara & Acceptera