High tech companies are the single most targeted industry for cyber attacks. Bad actors are relentlessly trying to acquire technological IP – patents, code, trade secrets, and strategic plans. While technology companies are highly progressive and agile in how they do business, many have an over-reliance on mobile devices for authentication, which can be sub-optimal with regards to security, cost, and ease of use. With YubiKey, tech companies can have it all while enjoying the fastest and highest ROI of any security investment. We even make your existing investments better.
The old way vs. the new way
The old way
Over-reliance on insecure and costly authentication methods:
Insecure legacy technologies such as SMS-based, knowledge based authentication (KBA), email, voice confirmation, etc.
Employee-owned mobile devices for 2FA (not always cheap/free/easy way to 2FA), and when mobile-phone based authentication device is lost or non-functional, 2FA "bypasses" create additional security risk issues
Exfiltration of IP risk from cameras on mobile devices (code, schematics, blueprints, formulas, sensitive financial data, etc.)
Single purpose devices (counter-based tokens) don’t scale across services and are expensive to buy – and replace
The new way: YubiKey
YubiKey is the smart way to protect intellectual property:
Low friction/highest security
Simple and convenient user experience – just tap and go
Cost-effective/vastly reduces support costs
Supports hundreds of applications and services with a single device
Economical to buy multiple keys/replacements
How the YubiKey helps
The #1 security key to prevent costly data breaches
Loved by users
Fastest security ROI
The invention behind global open authentication standards
“Other technologies, such as traditional OTP-based hardware tokens, smart cards, and biometrics didn’t fully support our need to allow multiple and rapid logins to SSH sessions.” – John Flynn, Former Facebook Security Team
Case in point: Google chooses YubiKey
Situation In 2009, Google was the target of sophisticated cyber attacks capable of circumventing traditional security controls. They had a lack of viable 2FA options to effectively prevent these attacks and account takeovers.
Solution Google began working closely with Yubico to extend the capabilities of the YubiKey 2FA technology to also include public key cryptography.
Result Yubico and Google co-created a strong authentication protocol based on the concept of a single phishing-resistant key to secure all services.
Since implementation, Google has experienced: Zero account takeovers 92% reduction in support costs 4X faster logins Zero failure rates