Resource Category: Solution briefs
-
Microsoft top 5 use cases Explore how Yubico and Microsoft are revolutionizing Zero Trust cybersecurity with phishing-resistant multi-factor authentication solutions. Read more Microsoft Yubico zero trust -
Manufacturing authentication compliance checklist Learn how phishing-resistant MFA can help manufacturers embrace data protection compliance with confidence. Read more compliance manufacturing phishing-resistant MFA -
Professional Services Deployment 360 Program Learn about Yubico’s Deployment 360 program which packages up all of the essential elements needed in getting your organization jump started on deploying YubiKeys. Read more deployment professional services YubiKey -
Professional Services Microsoft Entra ID CBA Implementation Learn how you can enlist dedicated technical engagement designed to help you implement YubiKeys and MFA with Microsoft Entra ID Hybrid using Certificate-Based Authentication (CBA). Read more CBA Microsoft Azure professional services -
Professional Services Deployment Advisors Consultants Read the solution brief to learn more about how Yubico Professional Services now offers dedicated Deployment Advisors to help shepherd you through your YubiKey deployment, from planning to wrap-up. Read more deployment professional services -
Professional Services Microsoft Entra ID Quick Start Workshop Join us for a comprehensive review and technical tips on integrating YubiKeys with Microsoft Azure. In addition, the workshop includes best practices on operational deployment topics plus post-workshop technical consulting hours. Read more Microsoft Azure professional services -
Professional Services YubiKey Distribution Planning Workshops Let us help you plan a comprehensive interactive workshop providing customized support in developing a plan for completing the distribution of YubiKeys across your organization. Read more professional services -
Not all MFA is created equal: Mobile MFA lures cybercriminals Legacy MFA such as mobile authentication is highly vulnerable to phishing and other forms of account takeovers. Learn about the pitfalls of mobile MFA and best practices to stop account takeovers. Read more mobile authentication phishing-resistant MFA -
Why your one time OTP legacy MFA is setting you up for a security breach Learn how phishing-resistant MFA addresses the gaps that legacy MFA creates. Read more MFA OTP security -
Infographic: Everything you need to know about passkeys View fullsize infographic below to learn everything you need to know about passkeys. Read more