-
- CERN deploys YubiKeys to protect accounts and server access
CERN protects critical assets, easily integrating systems to provide protection with just a touch.
Read more - City of Sacramento uses YubiKeys to secure remote workers
The City of Sacramento chose YubiKeys for MFA in conjunction with PortalGuard to secure remote workers
Read more - City of Southgate case study
Cyber threats against state and local governments on the rise In the past ten years, private and public sector organizations alike have faced increased levels of cyber attacks, including phishing and ransomware. For public sector organizations such as the City of Southgate, who provide critical utilities as well as police, fire and civil services, […]
Read more - Cloud-based hosting provider secures virtual machine keys with YubiHSM 2
Cloud-based hosting provider secures virtual machine keys with YubiHSM 2
Read more - Code Enigma deploys fast, secure, and easy authentication with YubiKey
Code Enigma rolls out an easy and convenient authentication solution for customers and developers.
Read more - Collège de Paris case study
Collège de Paris deploys simplified strong authentication The challenge: modernizing authentication and strengthening security At the start of 2021, Collège de Paris had a goal: to modernize the authentication methods of senior management, privileged users and IT administrators. Their previous authentication setup was complicated and time-consuming. Passwords had to be complex, and changed every three […]
Read more - Cryptocurrency investment firm TrueCode Capital leverages YubiKeys to secure accounts
Cryptocurrency risk management supported by phishing-resistant multi-factor authentication (MFA) Leaning into experience and technology to build a new legacy Unable to find such a solution, Peck set about building a system that would take advantage of the latest in machine learning, financial engineering and risk management methodologies and apply that to cryptocurrency. After testing the […]
Read more - Datadog leads in authentication best practices using YubiKey
Datadog gives every one of its employees a YubiKey to strengthen their position against phishing
Read more - Department of Defense contractor case study
Stringent DoD security requirements make the YubiKey the authentication hardware of choice.
Read more - Duke University protects critical IT systems with YubiKey
Duke protects users from phishing, keyloggers, and weak passwords with the touch of a button.
Read more