Tag: mobile authentication

Thumbnail

Passkey Guidance for Web and Mobile Apps

Learn what passkeys are, their benefits, deployment considerations, and how to implement WebAuthn passkey best practices.

Thumbnail

Security considerations for the top 8 mobile device-restricted workplaces

When looking at enterprises and organizations, there are many different business scenarios that can be present when addressing secure authentication. Whether those be shared workstations, remote workers, or even privileged accounts, there is one in particular that introduces its own difficulties: mobile device-restricted workplaces.  It’s safe to say that there will always be workplaces which,

Thumbnail

Why Your Mobile MFA Strategy is Attracting Cyber Crime and How to Fix it

Legacy MFA such as mobile authentication is highly vulnerable to phishing and other forms of account takeovers. Learn about the pitfalls of mobile MFA and best practices to stop account takeovers.

Thumbnail

A Day in the Life: Dispelling the Myths of Mobile Authentication

COVID-19 initiated the most rapid digital transformation ever witnessed—organizations fast-tracked two-factor and multi-factor authentication to transition millions of employees to work from home. But with remote and hybrid work likely to continue in 2022 and beyond, it’s time to step back and ask: is my in-use authentication as secure as I think it is? Is

Thumbnail

The Top 5 Mobile Authentication Misconceptions

Not all forms of MFA are created equal. Learn why mobile MFA is putting you at risk

Thumbnail

Federal authentication best practices for the mobile workforce

Thumbnail

The top 5 mobile authentication misconceptions: Demystifying the myth versus reality of legacy MFA

Download the Yubico White Paper, The top 5 mobile authentication misconceptions to learn the key misconceptions related to mobile-based MFA that are a ticking time bomb, and putting organizations at risk.

Thumbnail

Modern Authentication for the Federal Government: Enabling Mobile, Secure Authentication in Zero Trust Environments

Learn how DOD approved hardware security keys such as the YubiKey are ideal to fill PIV and CAC related authentication gaps across the federal government, and meet the MFA mandate in the Biden Executive Order 14028.

Software Development Toolkits (SDKs)

Yubico’s SDK offerings deliver rapid integration ofhardware-based strong authentication YubiKey SDKs Yubico has developed a range of mobile SDKs, such as for iOS and Android, and also desktop SDKs to enable developers to rapidly integrate hardware security into their apps and services, and deliver a high level of security on the range of devices, apps

Yubico Authenticator

Yubico Authenticator adds a layer of security for online accounts Generate 2-step verification codes on a mobile or desktop device Experience stronger security for online accounts by adding a layer of security beyond passwords Secure all services currently compatible with other authenticator apps, including Google Authenticator Hardware-backed security Add your credential to the YubiKey with