Yubico References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1471)
    75+ References
  • 4.8 / 5.0 (2190)
    Verified56+ References
  • 4.8 / 5.0 (549)
    20+ References

Yubico Case Studies

  • Linkbynet secures cloud environments with YubiKeys

  • SociaNOVA - Customer Case Study

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References75 total
    About

    FusionAuth is a single-tenant CIAM solution that deploys on-premises, in your private cloud, or on their fully-managed FusionAuth Cloud. Their JSON REST API provides advanced identity management that is easy for developers to deploy and implement on any platform or framework.

  • Reference Rating
    4.7 / 5.0
    Customer References56 total
    About

    HYPR, the Identity Assurance Company, helps organizations create trust in the identity lifecycle. The HYPR solution provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments.

  • Reference Rating
    4.7 / 5.0
    Customer References20 total
    About

    Keyless, they’re on a mission to provide businesses with the smoothest, safest, and most private passwordless authentication possible. Passwords, one-time codes, and FaceID all have their drawbacks, whether it's security risks, high costs, or poor user experience. They offer a simpler, safer, and more cost-effective alternative. Zero-Knowledge Biometrics (ZKB), their award-winning biometric system, is the only technology to date that combines the strengths of the two existing systems, providing the user experience of centralized biometrics with the privacy of local biometrics. Keyless is available for both consumers and employees, dramatically reducing ATO fraud while enhancing the user experience. Their MFA technology is resistant to phishing and compliant with all major data protection and payment regulations. Their solutions are used to authenticate users during logins, transactions, step-up actions, and account recovery, delivering the most secure and frictionless passwordless MFA experience available.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked