• English
    • Français
    • Deutsch
    • 日本語
    • Español
    • Svenska
  • Contact sales
  • Reseller locator
  • English English English en
  • Français Français French fr
  • Deutsch Deutsch German de
  • 日本語 日本語 Japanese ja
  • Español Español Spanish es
  • Svenska Svenska Swedish sv
Yubico
  • Why Yubico
    • For business
    • For individuals
    • For developers
  • Products
    • YubiKeys
    • YubiHSM
    • YubiEnterprise services
    • Services & software
    • Works with YubiKey
    • Find the right YubiKey
  • Solutions
    • Use Cases
      • Remote Workers
      • Passwordless
      • Microsoft 365
      • MFA modernization
      • Account takeovers
      • Compliance
      • Privileged users
      • Mobile restricted environments
      • Call centers
      • Secure password managers
    • Industries
      • Technology
      • Financial services
      • Cryptocurrency
      • Retail
      • Federal Government
      • State and Local Government
      • Elections and Political Campaigns
      • Education
      • Healthcare
  • Resources
    • Getting Started
    • COVID-19 Resources
    • White papers
    • Webinars
    • Product briefs
    • Case studies
    • Infographics
    • Yubico blog
    • Authentication standards
    • Videos
    • Developer program
    • Cybersecurity Glossary
  • Company
    • About us
    • The team
    • Innovation history
    • Careers & culture
    • Press room
    • Contact us
    • Partners
    • Events
    • Our customers
    • Free Speech program
    • Affiliate program
  • Support
    • Support services
    • Professional Services
    • Set up your YubiKey
    • Help
    • Documentation
    • Downloads
    • Buying and shipping
    • Security advisories
  • 
      • X
        Quick Links
        Find the Right YubiKey Set Up Your YubiKey Contact Us
        Knowledge Base
      • Search Yubico
  • Search
Store

Strong authentication
for remote workers

Drive productivity while ensuring strong security

Read the brief: Strong authentication for remote workers

Strong Auth for Remote Workers

Webinar: ‘5 Ways to Protect Remote Workers From Account Takeover’ Watch Now  Contact Sales

Secure remote workers
against cyber security threats

Yubico helps organizations of all sizes modernize workplace login and minimize cyber risk for remote workers with the YubiKey, by providing strong MFA access to business applications across employee and personal devices. YubiKeys offer the highest assurance security and the best user experience, helping organizations drive high productivity while protecting remote workers against phishing attacks and account takeovers.
Learn how Professional Services can help facilitate your remote workforce deployment

Enable MFA Access for IAM

Enable MFA access for Identity and Access Management systems and Identity Providers

Most leading hybrid and cloud environments leverage Identity and Access Management (IAM) solutions to enable employees to work without the hassle of multiple usernames and passwords. Using multi-factor authentication (MFA) with these services will enhance your security posture.

Enhance security across your entire organization by turning on multi-factor authentication (MFA) with the YubiKey. Leading IAM platforms such as Axiad, Duo, Google Cloud, Microsoft Azure Active Directory, Okta Workforce Identity, OneLogin, Ping Identity platform and RSA SecurIDⓇ Suite natively support YubiKeys, and can be used for Single Single On (SSO) to messaging and video conferencing apps such as Microsoft Teams, Google Hangouts and Zoom.

Protect remote workers against account takeovers

Two-factor authentication methods such as one-time passcodes and on-device prompts are tied to mobile devices and can be compromised by malware and SIM-swapping. Research by Google, NYU, and UCSD based on 350,000 real-world hijacking attempts has proven that SMS and mobile authenticators are not very effective in preventing account takeovers and targeted attacks.

Protect remote workers against account takeovers by replacing mobile authenticators and SMS with the YubiKey, leveraging FIDO2 and WebAuthn open authentication standards to provide the highest level of security assurance that protect your workers against phishing and man-in-the middle attacks.

Account takeover prevention rate - Visual


Account takeover prevention rate
Research by Google, NYU, and UCSD based on 350,000 real-world hijacking attempts. Results displayed are for targeted attacks
Source

Secure VPN access with MFA

Secure VPN access with MFA

Using VPNs to access corporate networks across home and public wifi can be risky with authentication relying solely on passwords, as passwords can be easily hacked.

The YubiKey ensures secure VPN access by acting as a strong second-factor authenticator. Pulse Secure and Cisco AnyConnect, can be configured to work with a YubiKey as a smartcard (PIV) for remote access. Other VPN applications that offer native support for YubiKeys use the one-time password (OTP) capabilities.

MFA for computer login

If remote employee laptops are not secured properly, they can provide entry points for external threats leading to a security breach, which can have financial, legal and reputational repercussions for your business.

YubiKeys secure computer logins, protecting on-device applications and critical business data. Multiple login options include authentication for Macs and Windows computers including those connected via Azure Active Directory, Active Directory and Microsoft Accounts. One of the most effective ways to secure computer access is to leverage the YubiKey smart card functionality, requiring a YubiKey and a PIN.

MFA for computer login
Step up authentication for password managers

Step up authentication for password managers

The majority of respondents in a recent Ponemon Institute report are still managing passwords with sticky notes and human memory. Whether your employees are remote or not, they need a simple and safe way to create, store, and manage passwords.

The YubiKey integrates with several enterprise-grade password managers including 1Password, Dashlane, Keeper Security, LastPass, and more, ensuring that lax password management policies don’t cause a security breach.

Secure & portable authenticator app

Many of the services or applications used internally may support time-based one-time passcodes (OTPs) — such as Google Authenticator, Microsoft Authenticator, or Authy — as a two-factor authentication method.

You can enhance phone-based one-time passcode authentication with the Yubico Authenticator, a cross-platform authenticator app that improves security and portability by storing TOTP secrets on the YubiKey and not on the mobile phone. This allows users to generate the OTP codes within the app by inserting or tapping the YubiKey to a device. Yubico authenticator is compatible with iOS, Android, PC and Mac.

Secure & portable authenticator app
Secure SSH authentication keys

Secure SSH authentication keys

SSH credentials used to access business servers are high value targets for hackers, as they are used by developers and systems administrators who may have higher access levels to critical systems and data. Storing SSH private keys on local devices leaves them at risk of being stolen. Additionally, manually typing OTP codes for MFA slows down access times and productivity as it takes users away from their workflows.

SSH users can authenticate to remote systems using private keys stored securely on a YubiKey. Storing SSH private keys on a YubiKey ensures that they cannot be copied, stolen remotely or accessed by malware on the device. Using YubiKeys also offers greater convenience and faster logins - with a single touch users are securely authenticated. YubiKeys can work with SSH with a variety of authentication protocols including OpenPGP, PIV, FIDO U2F, or OTP. Learn more

Works with YubiKey: Modernizing Workplace Login

Discover the services that help secure the remote workforce.

Search the catalog

"We were looking to add another layer of security to our POS offerings and previously the only option was 2FA via a phone call. With YubiKeys we were able to get the extra security benefits we needed at the touch of a button. It's also a highly secure solution for remote employee access".

Ryan Parks, Marketing Manager, Retail Control Systems


YubiKey MFA secures IAM Application Login


YubiKey enhances security for Computer Login


YubiKey secures VPN Access

Take the Next Step

Contact Sales
Get a YubiKey

Applicable Use Cases

Passwordless

Stop Account Takeovers

Modernize MFA

Protect Office 365

Quick Links

Ponemon Report: 2020 State of Authentication

What is the YubiKey?

Find
Take product finder quiz

Set up
Find set-up guides

Buy
Buy online
Contact sales
Find resellers

Stay connected
Sign up for email

RSS FeedTwitterLinkedInFacebookInstagramYoutubeGithub

Products
YubiKeys
YubiHSM
YubiEnterprise services
Services & software
Works with YubiKey
Find the right YubiKey

Why Yubico

For personal use
For businesses
For developers
Solutions
Remote Workers
Passwordless
Microsoft 365
Call centers
Cryptocurrency
Financial services
Federal Government
State & Local Government
More…
Resources
Getting Started
COVID-19 Resources
White papers
Webinars
Case studies
Product briefs
Infographics
Yubico blog
Authentication standards
Videos
Developer program
Company
About us
Trust in Yubico
The team
Innovation history
Careers & culture
Press room
Contact us
Partners
Events
Our customers
Affiliate program
Support
Support services
Professional Services
Set up your YubiKey
Knowledge base
Documentation
Downloads
Security advisories

Cookies Legal Trust Privacy Terms of Use

Yubico © 2021. All Rights Reserved.

We use cookies to ensure that you get the best experience on our site and to present relevant content and advertising. By browsing this site without restricting the use of cookies, you consent to our and third party use of cookies as set out in our Cookie Notice.
Accept Settings
Yubico Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Uncategorized

Undefined cookies are those that are being analyzed and have not been classified into a category as yet.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Preferences

Preference cookies are used to store user preferences to provide content that is customized and convenient for the users, like the language of the website or the location of the visitor.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

Save & Accept
Scroll to top