• Contact Sales
  • Subscription
  • Resellers
  • Support
Yubico Header Text LogoYubico Header Text Logo
Why Yubicoexpand_more
Why Yubico
  • Enterprises
  • SMBs
  • Individuals
  • Developers
  • Careers
  • Partner programs
  • Affiliate program
  • Contact Sales
  • Events
  • Press room
  • Yubico Blog
  • Yubico Executive Connect
  • About us
  • The team
  • Innovation history
  • Secure it Forward
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and usability

Why YubiKey
Proven at scale at Google

Google defends against account takeovers and reduces IT costs

Google Case Study
Protecting vulnerable organizations

Secure it Forward: One YubiKey donated for every 20 sold

Learn about Secure it Forward
Productsexpand_more
All products
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Computer login tools
  • Software Development Toolkits
  • YubiCloud
  • Using YubiKey is easy
  • Find the right YubiKey
  • Works with YubiKey
  • Compare YubiKeys
One key for hundreds of apps and services

YubiKey works out-of-the-box and has no client software or battery

Yubico protects you
See YubiKeys as a Service
YubiEnterprise Subscription delivers scale and savings

Gain a future-proofed solution and faster MFA rollouts

See YubiKeys as a Service
Solutionsexpand_more
Solutions overview
  • Zero Trust
  • Executive Order OMB M-22-09
  • Phishing-resistant MFA
  • Passwordless
  • Compliance
  • Cyber Insurance
  • Secure supply chain
  • Hybrid & remote workers
  • Secure privileged users
  • Mobile restricted environments
  • Call centers
  • Shared workstations
  • Microsoft ecosystem
  • Salesforce workspace
  • IAM solutions
  • AWS environment
The Bridge to Passwordless

Begin the journey to make your organization passwordless

Get the white paper
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
Federal cybersecurity requirements

See guidance for CIOs and leaders to prepare for the modern cyber threat era

See Gartner® Report
Industriesexpand_more
Industries overview
  • High tech
  • Federal government
  • State & local government
  • Education
  • Financial services
  • Manufacturing
  • Energy & natural resources
  • Retail & hospitality
  • Telecommunications
  • Healthcare
  • Pharmaceuticals
  • Cryptocurrency
  • Elections & campaigns
Manufacturing and supply chain security

Authentication best practices for manufacturing using highest-assurance security

Get the white paper
Phishing-resistant MFA: Fact vs. Fiction

Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines

Get the white paper
Secure energy and natural resources from cyber threats

Best practices for phishing-resistant MFA to safeguard your critical infrastructure

Get the white paper
Resourcesexpand_more
All resources
  • Yubico Blog
  • Cybersecurity glossary
  • Authentication standards
  • Resource library
  • Developer program
  • Product briefs
  • Solution briefs
  • COVID-19 Resources
  • Case studies
  • Get a pilot started
  • White papers and reports
  • Webinars
BeyondTrust: secured with a subscription

A global leader in Privileged Access Management adopts YubiEnterprise Subscription to simplify its deployment.

How they optimized ROI
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
Secure shared workstations against cyber threats

Shared workstations can be secured with phishing-resistant MFA.

Get the white paper
Supportexpand_more
Support home
  • Find the right YubiKey
  • Set up your YubiKey
  • Downloads
  • Product documentation
  • Support articles
  • Support Services
  • Professional Services
  • YubiEnterprise Subscription
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust
How to set up your YubiKey

Follow our guided tutorials to start protecting your favorite services.

Set up your YubiKey
Find the best YubiKey for your needs

Take the guided quiz and see which YubiKey best fits your or your businesses needs.

Take the quiz
Accelerate your YubiKey deployment

Technical and operational guidance for your YubiKey implementation and rollout.

Professional Services
SubscribeStore
  • Yubico Hero Image

    Yubico phishing-resistant, multi-factor authentication (MFA) stops account takeovers for the world’s largest organizations.

    Discover subscription
    Image

    Yubico’s award-winning security key, the YubiKey, is 100% built for security and trusted by millions, delivering modern authentication and peace of mind to Enterprises, SMBs, Individuals, and Developers.

    Changing the game for modern phishing-resistant authentication

    The YubiKey is hardware authentication reimagined. Secure the identities of your employees and users, reduce support costs, and experience an unmatched user experience.

    Icon

    0 account takeovers

    Icon

    92% reduction in support calls

    Icon

    4x faster login

    Legacy MFA can be easily bypassed

    In this video, ethical hacker Rachel Tobac explains how a typical modern cyber attack works, and shows how hardware security keys offer better security than legacy MFA such as mobile authentication.

    Move away from broken MFA

    Did you know 90% of all internet breaches are due to stolen login credentials? SMS, mobile authentication apps, and legacy one-time passcodes (OTPs) are vulnerable to today’s advanced threats.

    To stop modern threats you must have modern phishing-resistant authentication.

    Read the Forrester Consulting study commissioned by Yubico and see how a composite  organization reduced risk by 99.9%, saw a drop in password-related helpdesk tickets by 75%, and experienced a 203% 3-year ROI with YubiKeys.

    “We run our environment through various penetration tests and simulated attacks and, of course, YubiKeys stand up against all that.”

    Director of security engineering, Energy
    people in a line

    Protecting from human error

    Employees are busy and can be distracted. In fact, 9 out of 10 cybersecurity breaches are caused by employee mistakes.

    The YubiKey protects the human layer by eliminating “MFA fatigue.” Remove the guesswork and ensure your employees, and only your employees, can get in.

    security protocols

    True phishing-resistant MFA

    As part of a Zero Trust framework, phishing-resistant MFA is immune to attackers intercepting or even tricking users into revealing credentials.

    The YubiKey is your Key to Trust, supporting the strongest phishing-defense available with WebAuthn/FIDO (passkeys) and Smart Card/PIV authentication.


    How YubiKey works

    No more reaching for your phone to open an app, or memorizing and typing in a code – simply touch the YubiKey to verify and you’re in. Additionally, you don’t need to use the YubiKey every time. Once an app or service is verified, it can stay trusted. It’s that easy.

    YubiKeys are available in a wide range of form factors, support multiple authentication protocols and work with hundreds of applications and services. They do not require a mobile connection or batteries, are water and crush-resistant, and last a really long time.

    Ready to scale phishing-resistant MFA?

    Experience YubiKeys as a Service with YubiEnterprise Subscription. Modern threats can only be stopped with modern security across your organization.

    What the industry is saying

    “Yubico’s role in the industry is unique, the solutions that Yubico offers today are the next generation of identity security. The rest of the world needs to catch up with Yubico and not the other way around.”

    Quote Image
    Steve Brasen, Research Director, Enterprise Management Associates

    Ordering for more than 500 users? Learn about how YubiEnterprise Subscription delivers strong security in a more flexible and cost-effective way. Gain peace of mind for less than $4 per user per month

    Discover subscription

    What do these tech leaders have in common?

    They all support YubiKeys for modern authentication

    See more


    Case studies

    See more

    Figma implements strong security
    Read the case study
    Arvika Municipality enhances security
    Read the case study
    Schneider Electric implements MFA
    Read the case study

    Featured Content

    See more

    Think you’re not impacted by the new Executive Order on cybersecurity? Think again.

    Read more

    Stop ransomware attacks before they take hold. Do it with true phishing-resistant MFA

    Read white paper

    Looking for cyber insurance but the bar is now higher? Consider phishing-resistant MFA.

    Read more

    In the press

    See more

    Alt Text
    The Best Security Key for Multi-Factor Authentication
    The Wall Street Journal
    You need two-factor authentication, but some types are safer than others
    Alt Text
    Ukraine ramps up cyber defenses to slow surge in attacks
    Alt Text
    The best security keys: Protect your online accounts
    Alt Text
    As important as bulletproof vest: Yubico sends 20,000 keys to Ukrainian government and energy agencies
    Alt Text
    Yubico announces security keys with fingerprint readers

    Get Started

    Find the right YubiKey

    Take a quick product finder quiz and find the right YubiKey for you or your business.

    Start quiz
    Set up your YubiKey

    Set up your YubiKey as a form of two-factor authentication and secure supported services.

    Get started
    Trusted, modern MFA

    Loved by Enterprises, SMBs, Individuals, and Developers.

    Learn more
Yubico Footer Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • GitHub
  • Product finder quiz
  • Find set-up guides
  • Buy online
  • Contact sales
  • Get Yubico updates
  • Careers
  • Events
  • Press room
  • About us
  • Partner programs
  • Affiliate program
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Zero Trust
  • Phishing-resistant MFA
  • Passwordless
  • Cyber insurance
  • More solutions
  • Industries overview
  • Yubico blog
  • Resource library
  • Cybersecurity glossary
  • Authentication standards
  • Developer program
  • Works with YubiKey
  • Help center
  • Downloads
  • Product documentation
  • Support Services
  • Professional Services
  • Professional Services
  • Contact support
Yubico © 2023 All Rights Reserved.
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust
We use cookies to ensure that you get the best experience on our site and to present relevant content and advertising. By browsing this site without restricting the use of cookies, you consent to our and third party use of cookies as set out in our Cookie Notice.

PreferencesAccept all
Yubico Privacy and Cookies Policy

Privacy Overview

Yubico.com uses cookies to improve your experience while navigating through the website. When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually identify you, but it can give you a more personalized web experience.

Because we respect your right to privacy, you can choose not to allow some types of cookies.

Click on the different category headings to find out more and change our default settings.

Blocking some types of cookies may impact your experience on our site and the services we are able to offer.
Strictly necessary cookies
Always Enabled

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Functional cookies

These cookies enable the website to provide enhanced functionality and personalization. They may set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Performance cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Targeting cookies

These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Uncategorized

Undefined cookies are those that are being analyzed and have not been classified into a category as yet.

Matomo Anonymized Tracking
Save & Accept