Yubico References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4386)
    Premium240+ References
  • 4.8 / 5.0 (1086)
    27+ References
  • 4.8 / 5.0 (1105)
    21+ References

Yubico Case Studies

  • Swansea University secures access to world-class database

  • Luther Burbank Njrotc - Customer Case Study

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References240 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References27 total
    About

    Transmit Security gives businesses the modern tools they need to build secure, trusted and end-to-end digital identity journeys to innovate and grow. CX-focused, cybersecurity-conscious leaders rely on Transmit Security’s CIAM platform to provide their customers with smooth experiences protected from fraud across all channels and devices. Transmit Security serves many of the world’s largest banks, insurers, retailers, and other leading brands, collectively responsible for more than $2 trillion in annual commerce.

  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Trusona removes passwords from the user experience across your organization. Since 2015, they've helped companies achieve higher levels of assurance in digital identity by moving beyond the vulnerabilities of traditional username/password authentication to passwordless identity authentication. Trusona enables customers to instantly mitigate eight of the most common attack vectors used by bad actors to infiltrate their most trusted accounts.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked