Strong authentication for remote workers
Drive productivity while ensuring strong security
5 Ways to Protect Remote Workers From Account Takeover
Learn five critical ways companies can protect their remote workforce from common vulnerabilities such as credential theft, account takeovers, and phishing attacks.
Secure remote workers against cyber security threats
Yubico helps organizations of all sizes modernize workplace login and minimize cyber risk for remote workers with the YubiKey, by providing strong MFA access to business applications across employee and personal devices. YubiKeys offer the highest assurance security and the best user experience, helping organizations drive high productivity while protecting remote workers against phishing attacks and account takeovers.
Enable MFA access for Identity and Access Management systems and Identity Providers
Most leading hybrid and cloud environments leverage Identity and Access Management (IAM) solutions to enable employees to work without the hassle of multiple usernames and passwords. Using multi-factor authentication (MFA) with these services will enhance your security posture.
Enhance security across your entire organization by turning on multi-factor authentication (MFA) with the YubiKey. Leading IAM platforms such as Axiad, Duo, Google Cloud, Microsoft Azure Active Directory, Okta Workforce Identity, OneLogin, Ping Identity platform and RSA SecurIDⓇ Suite natively support YubiKeys, and can be used for Single Single On (SSO) to messaging and video conferencing apps such as Microsoft Teams, Google Hangouts and Zoom.
Protect remote workers against account takeovers
Two-factor authentication methods such as one-time passcodes and on-device prompts are tied to mobile devices and can be compromised by malware and SIM-swapping. Research by Google, NYU, and UCSD based on 350,000 real-world hijacking attempts has proven that SMS and mobile authenticators are not very effective in preventing account takeovers and targeted attacks.
Protect remote workers against account takeovers by replacing mobile authenticators and SMS with the YubiKey, leveraging FIDO2 and WebAuthn open authentication standards to provide the highest level of security assurance that protect your workers against phishing and man-in-the middle attacks.
Secure VPN access with MFA
Using VPNs to access corporate networks across home and public wifi can be risky with authentication relying solely on passwords, as passwords can be easily hacked.
The YubiKey ensures secure VPN access by acting as a strong second-factor authenticator. Pulse Secure and Cisco AnyConnect, can be configured to work with a YubiKey as a smartcard (PIV) for remote access. Other VPN applications that offer native support for YubiKeys use the one-time password (OTP) capabilities.
“We were looking to add another layer of security to our POS offerings and previously the only option was 2FA via a phone call. With YubiKeys we were able to get the extra security benefits we needed at the touch of a button. It’s also a highly secure solution for remote employee access”.
MFA for computer login
If remote employee laptops are not secured properly, they can provide entry points for external threats leading to a security breach, which can have financial, legal and reputational repercussions for your business.
YubiKeys secure computer logins, protecting on-device applications and critical business data. Multiple login options include authentication for Macs and Windows computers including those connected via Azure Active Directory, Active Directory and Microsoft Accounts. One of the most effective ways to secure computer access is to leverage the YubiKey smart card functionality, requiring a YubiKey and a PIN.
Step up authentication for password managers
The majority of respondents in a recent Ponemon Institute report are still managing passwords with sticky notes and human memory. Whether your employees are remote or not, they need a simple and safe way to create, store, and manage passwords.
The YubiKey integrates with several enterprise-grade password managers including 1Password, Dashlane, Keeper Security, LastPass, and more, ensuring that lax password management policies don’t cause a security breach.
Secure & portable authenticator app
Many of the services or applications used internally may support time-based one-time passcodes (OTPs) — such as Google Authenticator, Microsoft Authenticator, or Authy — as a two-factor authentication method.
You can enhance phone-based one-time passcode authentication with the Yubico Authenticator, a cross-platform authenticator app that improves security and portability by storing TOTP secrets on the YubiKey and not on the mobile phone. This allows users to generate the OTP codes within the app by inserting or tapping the YubiKey to a device. Yubico authenticator is compatible with iOS, Android, PC and Mac.
Secure SSH authentication keys
SSH credentials used to access business servers are high value targets for hackers, as they are used by developers and systems administrators who may have higher access levels to critical systems and data. Storing SSH private keys on local devices leaves them at risk of being stolen. Additionally, manually typing OTP codes for MFA slows down access times and productivity as it takes users away from their workflows.
SSH users can authenticate to remote systems using private keys stored securely on a YubiKey. Storing SSH private keys on a YubiKey ensures that they cannot be copied, stolen remotely or accessed by malware on the device. Using YubiKeys also offers greater convenience and faster logins – with a single touch users are securely authenticated. YubiKeys can work with SSH with a variety of authentication protocols including OpenPGP, PIV, FIDO U2F, or OTP. Learn more
Works with YubiKey: Modernizing Workplace Login
Discover the services that help secure the remote workforce.
Strong MFA for first responders
Securing remote workers can get complex. The YubiKey hardware-based strong authentication enables remote employees to be productive while staying secure.
Zero trust and the Critical Role for Strong Authentication
Learn what is strong authentication and why it is a critical part of Zero Trust.
Examining the CISO agenda in 2021
CISOs are paid to worry, and there’s a lot to worry about in 2021. The recent SolarWinds breach, the Capitol break-in, and a series of high-profile hacks are spurring many enterprises to re-examine their security strategies. We discuss what lies ahead with Yubico’s CISO, Chad Thunberg. Q: What’s top of mind for CISOs in 2021? The SolarWinds …