Yubico References Capped?

Access even more references from these marketplace competitors

  • 4.7 / 5.0 (4135)
    Premium235+ References
  • 4.8 / 5.0 (817)
    50+ References
  • 4.8 / 5.0 (1593)
    Premium33+ References

Yubico Testimonials

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References235 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References50 total
    About

    Stytch's APIs make it simple to seamlessly onboard, authenticate, and engage users. Improve security and user experience with passwordless authentication. Vendor downtime directly impacts your ability to engage users, which is why they’ve built failover logic across multiple vendors for SMS and email. Improve security and avoid account takeovers with passwordless authentication.

  • Reference Rating
    4.7 / 5.0
    Customer References33 total
    About

    WinMagic provides application aware Intelligent Key Management for enterprise controlled grade encryption, with robust, manageable and easy-to-use data security solutions. WinMagic SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked