Sveavägen 44, 5th floor • 111 34 Stockholm • Sweden
Yubico changes the game for strong authentication, providing superior security with unmatched ease-of-use.
Our core invention, the YubiKey, is a small USB and NFC device supporting multiple authentication and cryptographic protocols. With a simple touch, it protects access to computers, networks, and online services for the world’s largest organizations.
Yubico is the leading contributor to the FIDO Universal 2nd Factor open authentication standard. Our technology is deployed in 8 of the top 10 internet companies, and is loved by millions of users in more than 150 countriesFor more information, please visit www.yubico.com.
|May 09 ‑ May 12, 2017||
European Identity & Cloud Conference 2017
European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.
|May 10 ‑ May 13, 2016||
European Identity & Cloud Conference 2016
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
|May 05 ‑ May 08, 2015||
European Identity & Cloud Conference 2015
European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
|Feb 29, 2016||
Executive View: YubiKey by Yubico - 70842
YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of…
|May 23, 2016||
Stina Ehrensvärd - The Future of Strong Online Identities - Simple, Open and Mobile
Just like Volvo realized, when developing the 3-point seat-belt, security needs to be simple and work in a simple gesture - or users will not adopt it. Volvo also knew that in order to scale to every car and user, their invention needed to be an open standard. Eventually, all countries made the seat-belt a legal requirement, and it has since then saved millions of lives.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]