Stop account takeovers, go passwordless, and achieve phishing-resistant multi-factor authentication
Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, shared workspaces, and internet accounts. The YubiKey — the groundbreaking hardware-based security key — has been proven for strong security and phishing defense, is easy-to-use, and lowers TCO by reducing password-related calls to the helpdesk. Your organization will benefit with a simple, easy-to-use experience while reducing up to 92% reduction in support costs. Security-conscious organizations trust the YubiKey to secure their most important systems and data.
Accelerate your journey to a Zero Trust framework with the industry’s leading modern multi-factor authentication solution. YubiKeys provide easy to use, phishing-resistant multi-factor authentication (MFA) to increase security and mitigate account takeovers. Whether your identity access management platform is based on Azure AD or Active Directory, Yubico offers a secure authentication solution that meets you where you are on your Zero Trust, MFA, and passwordless journeys.
YubiKeys support multiple authentication protocols like FIDO2 and WebAuthn, as well as OTP, SmartCard (PIV), OpenPGP, FIDO U2F, and more, allowing them to work with both legacy and modern cloud-based infrastructures. A single device supports hundreds of applications and services, and seamlessly works across all operating systems and mobile devices.
YubiKeys are available as a three year Saas subscription offering through the Azure Marketplace with the benefits of a single invoice, simplified procurement, and the use of Opex dollars vs Capex. Subscriptions include upgrade benefits and purchases count towards customers Microsoft Azure Consumption Commitment (MACC).
YubiKey subscription can also be purchased using the Azure MACC dollars. The full amount spent on the subscription is credited towards the MACC contract, providing you the benefit of not losing unused committed dollars while enhancing your organization’s security infrastructure. More details can be found here