Yubico References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1658)
    Premium39+ References
  • 4.8 / 5.0 (791)
    50+ References
  • 4.8 / 5.0 (948)
    50+ References

Yubico Testimonials

  • “Staff have come back and have said ‘Thank God for this, I’m not using passwords anymore and having to remember them.”

  • “U2F helps security by bringing a very user-friendly, easy-to-use device to end-users and developers and providing strong hardware-backed multi-factor authentication. The YubiKey devices – they’re durable, they’re easy-to-use, they bring just very strong authentication to the user.”

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References39 total
    About

    More security shouldn’t mean more obstacles. For 20 years, SecureAuth has helped leading companies simplify identity and access management for customers and employees—creating experiences that are as welcoming as they are secure. SecureAuth is redefining authentication for the modern enterprise. Today’s evolving threat landscape demands innovative, adaptive security solutions. As the first-to-market provider of continuous facial authentication, we go beyond the initial authentication to deliver ongoing security throughout the entire session. Our mature AI-driven Risk Engine delivers dynamic, and often invisible, authentication, making you more effective than ever at eliminating threats while ensuring frictionless, secure access for employees and customers. Welcome to Better Identity.

  • Reference Rating
    4.7 / 5.0
    Customer References50 total
    About

    Stytch's APIs make it simple to seamlessly onboard, authenticate, and engage users. Improve security and user experience with passwordless authentication. Vendor downtime directly impacts your ability to engage users, which is why they’ve built failover logic across multiple vendors for SMS and email. Improve security and avoid account takeovers with passwordless authentication.

  • Reference Rating
    4.7 / 5.0
    Customer References50 total
    About

    Teleport is the easiest, most secure way to access all your infrastructure. The open-source Teleport Access Plane consolidates connectivity, authentication, authorization, and audit into a single platform. By consolidating all aspects of access for engineers and the software they write, Teleport reduces attack surface area, cuts operational overhead, easily enforces compliance, and improves productivity.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked