Resource Category: Solution briefs

Home » Solution briefs » Page 5
  • Yubico and Microsoft data sheet featured imageMicrosoft top 5 use casesExplore how Yubico and Microsoft are revolutionizing Zero Trust cybersecurity with phishing-resistant multi-factor authentication solutions.Read moreMicrosoftYubicozero trust
  • Manufacturing authentication checklist asset previewManufacturing authentication compliance checklistLearn how phishing-resistant MFA can help manufacturers embrace data protection compliance with confidence.Read morecompliancemanufacturingphishing-resistant MFA
  • Deployment 360 solution brief previewProfessional Services Deployment 360 ProgramLearn about Yubico’s Deployment 360 program which packages up all of the essential elements needed in getting your organization jump started on deploying YubiKeys. Read moredeploymentprofessional servicesYubiKey
  • cba implementation imageProfessional Services Microsoft Entra ID CBA ImplementationLearn how you can enlist dedicated technical engagement designed to help you implement YubiKeys and MFA with Microsoft Entra ID Hybrid using Certificate-Based Authentication (CBA).Read moreCBAMicrosoft Azureprofessional services
  • Professional Services Deployment Advisors Consultants Read the solution brief to learn more about how Yubico Professional Services now offers dedicated Deployment Advisors to help shepherd you through your YubiKey deployment, from planning  to wrap-up. Read moredeploymentprofessional services
  • entra id quickstart imageProfessional Services Microsoft Entra ID Quick Start WorkshopJoin us for a comprehensive review and technical tips on integrating YubiKeys with Microsoft Azure. In addition, the workshop includes best practices on operational deployment topics plus post-workshop technical consulting hours.Read moreMicrosoft Azureprofessional services
  • preview of solution briefProfessional Services YubiKey Distribution Planning WorkshopsLet us help you plan a comprehensive interactive workshop providing customized support in developing a plan for completing the distribution of YubiKeys across your organization.Read moreprofessional services
  • Not all MFA is created equal: Mobile MFA lures cybercriminalsLegacy MFA such as mobile authentication is highly vulnerable to phishing and other forms of account takeovers. Learn about the pitfalls of mobile MFA and best practices to stop account takeovers.Read moremobile authenticationphishing-resistant MFA
  • Why your one time OTP legacy MFA is setting you up for a security breachLearn how phishing-resistant MFA addresses the gaps that legacy MFA creates.Read moreMFAOTPsecurity
  • passkey featured imageInfographic: Everything you need to know about passkeysView fullsize infographic below to learn everything you need to know about passkeys.Read more