IBM and Yubico Simplify Strong Security for Enterprises

IBM Security and Yubico

Raise your hand if you’re a fan of security products that live up to their name and also deliver a delightful user experience! You know we are, and that’s why we’re happy to announce a joint effort with IBM to deliver FIDO Universal 2nd Factor (U2F) protection with the YubiKey through the IBM Security Access Manager (ISAM). The FIDO U2F open authentication standard provides the highest level of security assurance and protects against phishing and man-in-the middle attacks aimed at stealing credentials and gaining access to enterprise systems and services.

If you’re an ISAM customer, and are currently evaluating two-factor authentication (2FA) or multi-factor authentication (MFA) options, then look no further. IBM has integrated the strongest level of 2FA to ISAM with YubiKey and FIDO U2F support. The YubiKey FIDO U2F Settings Configurator for ISAM is available in the IBM Security App Exchange, a marketplace where developers across the industry can share applications based on IBM Security technologies.

The new app enables ISAM Administrators to quickly and easily reconfigure the ISAM appliance to enforce FIDO U2F with YubiKey attestation in a matter of minutes. From there, end users are able to register their own YubiKeys for easy, secure access to any systems you have connected for Single Sign-On (SSO).The YubiKey offers a frictionless authentication experience for ISAM admins, users throughout the organization, and external customers.

Let us know how we can help rollout the YubiKey to provide security for your enterprise.

Talk to our teamTalk to our team

Share this article:


  • Digital security’s unique role in protecting our environmentAs sustainability expands to include social, economic, and technological challenges, cybersecurity has emerged as a top global threat – with cybercrime projected to cost $12 trillion this year. Stolen credentials and phishing account for 80% of breaches. At Yubico, making the world more secure is just part of how we care for the world around […]Read moreCSREarth DaySecure It ForwardSustainability
  • Breaking down Australia’s plan to combat AI-driven phishing scamsAcross Australia, cybercrime continues to be a major challenge impacting businesses, critical infrastructure and consumers alike. The use of AI by bad actors across the spectrum of cybercrime is on the rise, and as a result, credential phishing scams are becoming increasingly sophisticated. AI is effectively helping to lower the cost of phishing and increase […]Read moreAIAPACAustraliaphishing
  • 5 fast cybersecurity tips to clean up your digital lifeWith today being Identity Management Day, now is the perfect time to take stock of your online presence, update security settings, and ensure that your personal data remains protected from cyber threats like phishing. We’re also seeing increasing concerns of DeepSeek and other AI tools around data privacy making these kinds of attacks more successful […]Read morebest practices
  • Navigating the PCI DSS 4.0 transition and meeting compliance with phishing-resistant YubiKeysIn just a few days, on March 31, 2025, decision makers in industries that involve payment processing – including financial services, retail & hospitality and telecommunications – are tasked to finalize the transition to Payment Card Industry Data Security Standard (PCI DSS) 4.0. This deadline marks a critical juncture for all organizations handling payment card […]Read moreNISTPCI DSSPCI DSS 4.0