Sveavägen 44, 5th floor • 111 34 Stockholm
Yubico changes the game for strong authentication, providing superior security with unmatched ease-of-use.
Our core invention, the YubiKey, is a small USB and NFC device supporting multiple authentication and cryptographic protocols. With a simple touch, it protects access to computers, networks, and online services for the world’s largest organizations.
Yubico is the leading contributor to the FIDO Universal 2nd Factor open authentication standard. Our technology is deployed in 8 of the top 10 internet companies, and is loved by millions of users in more than 150 countriesFor more information, please visit www.yubico.com.
|May 10 ‑ May 13, 2016||
European Identity & Cloud Conference 2016
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
|May 05 ‑ May 08, 2015||
European Identity & Cloud Conference 2015
European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
|Feb 29, 2016||
Executive View: YubiKey by Yubico - 70842
YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of…
|May 23, 2016||
Stina Ehrensvärd - The Future of Strong Online Identities - Simple, Open and Mobile
Just like Volvo realized, when developing the 3-point seat-belt, security needs to be simple and work in a simple gesture - or users will not adopt it. Volvo also knew that in order to scale to every car and user, their invention needed to be an open standard. Eventually, all countries made the seat-belt a legal requirement, and it has since then saved millions of lives.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally. Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access [...]