Yubico References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4427)
    Premium240+ References
  • 4.8 / 5.0 (1514)
    75+ References
  • 4.8 / 5.0 (1756)
    Premium33+ References

Yubico Case Studies

  • Government of Nunavut turns to phishing-resistant YubiKeys after ransomware attack

  • Datadog leads in authentication best practices, deploys YubiKeys to all employees enterprise-wide

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References240 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References75 total
    About

    FusionAuth is a single-tenant CIAM solution that deploys on-premises, in your private cloud, or on their fully-managed FusionAuth Cloud. Their JSON REST API provides advanced identity management that is easy for developers to deploy and implement on any platform or framework.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked