Yubico References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (971)
    21+ References
  • 4.8 / 5.0 (575)
    27+ References
  • 4.8 / 5.0 (1592)
    Premium33+ References

Yubico Case Studies

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References21 total
    About

    Trusona removes passwords from the user experience across your organization. Since 2015, they've helped companies achieve higher levels of assurance in digital identity by moving beyond the vulnerabilities of traditional username/password authentication to passwordless identity authentication. Trusona enables customers to instantly mitigate eight of the most common attack vectors used by bad actors to infiltrate their most trusted accounts.

  • Reference Rating
    4.7 / 5.0
    Customer References27 total
    About

    TrustBuilder is a core member of the inWebo Group. The company delivers frictionless customer experience and airtight security throughout the digital journeys of consumers, employees, partners, and machines SaaS cybersecurity solution allows companies to acquire new customers, grow revenue and reduce costs. As a European player in Identity and Access Management, data privacy and compliance with global, regional, and local regulations are inseparable in DNA.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked