Sveavägen 44, 5th floor • 111 34 Stockholm • Sweden
Yubico sets new world standards for simple, secure login, preventing unauthorized access to computers, servers, and internet accounts.
Supporting multiple authentication and encryption protocols on all devices and platforms, YubiKeys protect access to user accounts for the world’s largest enterprises with a simple touch, and with no driver or client software needed. Yubico is a leading contributor to the FIDO Universal 2nd Factor open authentication standard, and Yubico’s technology is used, and loved, in more than 160 countries.
Founded in 2007, Yubico is privately held with offices in Palo Alto (California), Seattle (Washington), and Stockholm (Sweden).
|May 09 ‑ May 12, 2017||
European Identity & Cloud Conference 2017
European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.
|May 10 ‑ May 13, 2016||
European Identity & Cloud Conference 2016
European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
|May 05 ‑ May 08, 2015||
European Identity & Cloud Conference 2015
European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.
|Feb 29, 2016||
Executive View: YubiKey by Yubico - 70842
YubiKey is a hardware authentication device that provides two-factor authentication using either one-time passwords or public key infrastructures. Combining strong cryptography with ease of…
|May 23, 2016||
Stina Ehrensvärd - The Future of Strong Online Identities - Simple, Open and Mobile
Just like Volvo realized, when developing the 3-point seat-belt, security needs to be simple and work in a simple gesture - or users will not adopt it. Volvo also knew that in order to scale to every car and user, their invention needed to be an open standard. Eventually, all countries made the seat-belt a legal requirement, and it has since then saved millions of lives.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
WannaCry counts, without any doubt, amongst the most widely publicized cyber-attacks of the year, although this notoriety may not necessarily be fully justified. Still, it has affected hospitals, public transport, and car manufacturing, to name just a few of the examples that became public. In an [...]
Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]