0% found this document useful (0 votes)
178 views2 pages

YubiKey 5 Series Product Brief

The document discusses YubiKey security keys which provide passwordless and multi-factor authentication through hardware-based public key cryptography. YubiKeys support various protocols and form factors and are used by many large companies to eliminate account takeovers while reducing IT costs through lower support calls and password resets. They offer proven, easy to deploy security at scale.

Uploaded by

rastkosmail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
178 views2 pages

YubiKey 5 Series Product Brief

The document discusses YubiKey security keys which provide passwordless and multi-factor authentication through hardware-based public key cryptography. YubiKeys support various protocols and form factors and are used by many large companies to eliminate account takeovers while reducing IT costs through lower support calls and password resets. They offer proven, easy to deploy security at scale.

Uploaded by

rastkosmail
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

YubiKey 5 Series

The multi-protocol security key that


enables passwordless
The YubiKey 5 Series–from left to right: YubiKey 5 NFC, YubiKey 5C NFC,
YubiKey 5Ci, YubiKey 5C, YubiKey 5 Nano and YubiKey 5C Nano.
Relying solely on username and password security
puts enterprise data at risk
Catastrophic security breaches top world headlines every day, The YubiKey 5 Series security keys deliver expanded
and for good reason. A single corporate security breach costs an authentication options
average of $4.24M,1 and 61% of breaches are caused by stolen • Strong Single Factor—Passwordless: Replaces weak
or weak passwords.2 As a result, IT organizations cannot rely passwords with passwordless tap-n-go secure login.
exclusively on passwords to protect access to corporate data.
• Strong Two Factor—Password + Authenticator: Adds a
Adopting stronger employee and customer authentication is
tap-n-go second factor for secure two factor authentication.
essential to avoiding risk and becoming the next target.
• Strong Multi-Factor—Passwordless + PIN: Combines
Phishing-resistant MFA with Smart Card/PIV and tap-n-go authentication with a PIN, to solve high assurance
FIDO2/WebAuthn requirements such as financial transactions, or submitting
The YubiKey 5 Series is a hardware-based authentication a prescription.
solution that provides superior defense against account
The YubiKey delivers strong authentication at scale
takeovers and enables compliance. The YubiKey offers
strong authentication with support for multiple protocols, The YubiKey multi-protocol support streamlines authentication
including existing Smart Card/PIV, and FIDO2/WebAuthn, the for existing systems while paving the way forward to a
new standard enabling the replacement of weak password- passwordless future.
based authentication. With the YubiKey, security is heightened • Authentication and cryptographic protocols supported
with strong hardware-based authentication using public include FIDO Universal 2nd Factor (U2F), FIDO2/WebAuthn,
key cryptography. And the YubiKey is easy to use, fast and Personal Identity Verification-compatible (PIV) Smart Card,
reliable, and is proven at scale to significantly reduce IT costs and OpenPGP smart card.
and eliminate account takeovers. • Works across major operating systems including Microsoft
Windows, macOS, iOS, Android, and Linux, as well as
leading browsers.
• Available in a choice of form factors that enable users to
connect via the USB, NFC or Lightning connector.
• The YubiKey 5C NFC offers multi-protocol capabilities with
both USB-C and NFC capabilities for secure tap and go
authentication on all the modern devices users love.

1
IBM, 2021 Cost of Data Breach Report
2
Verizon, 2021 Data Breach Investigations Report

YubiKeys 9 of the top 10 4 of the top 10 5 of the top 10


deployed in: global technology U.S. banks global retailers
companies
YubiKey: Proven, easy-to-use security that’s trusted by the
world’s leading companies

Eliminate account takeovers Easy to deploy


Any software downloaded on a computer or phone is IT can deploy YubiKeys in days, not months. A single key,
vulnerable for malware and hackers. The YubiKey is based on through its flexible multi-protocol capabilities, can work
hardware with the authentication secret stored on a separate out-of-the-box with hundreds of systems, both cloud and
secure chip built into the YubiKey, with no connection to the on-premises. This eliminates the need for costly integrations
internet so it cannot be copied or stolen. or separate devices for each system.

Reduce IT costs
The YubiKey dramatically reduces the number one IT support FIDO2 FIDO U2F Smart Card (PIV)
cost—password resets—which cost Microsoft over $12M
per month.3
By switching from mobile one time passwords (OTPs) to
YubiKeys, Google saw the following results.4

• Zero account takeovers


• 4x faster logins
• 92% fewer IT support calls
OATH Config Open PGP
(TOTP/HOTP) Slot 1 & 2
SUPPORT INCIDENTS PER USER PER MONTH
100
YubiKey capabilities: These functions are included in the YubiKey 5 NFC,
Percent of users using Security Keys

YubiKey 5C NFC, YubiKey 5C, YubiKey 5 Nano, the YubiKey 5C Nano,


80 and the YubiKey 5Ci security keys. Technical specifications are available
at yubico.com.
Support incidents

Security Key 60
OTP Trusted authentication leader
Active Security Key users
40
Yubico is the principal inventor of the FIDO2/WebAuthn and
U2F authentication standards adopted by the FIDO alliance
and is the first company to produce the U2F security key and
20 a multiprotocol FIDO2/WebAuthn authenticator.
YubiKeys are produced in our offices in the USA and Sweden,
0
maintaining security and quality control over the entire
JUL-14 SEPT-14 NOV-15 JAN-15 MAR-15 MAY-15 JUL-15 SEP-15 NOV-15
manufacturing process.
This graph illustrates how quickly Google reduced password support
incidents after switching from OTP to YubiKey.5

Easy to use, fast, and reliable


WATER RESISTANT CRUSH RESISTANT MADE IN US & SWEDEN
Users don’t need to install anything and can use the YubiKey
in minutes. And the YubiKey is reliable because it does not
require a battery or cellular connectivity, so it’s always on
and accessible. Contact us Learn more
yubi.co/contact yubi.co/yk5
The YubiKey 5 NFC, YubiKey 5C NFC, YubiKey 5C, and
YubiKey 5Ci fit conveniently on a keyring, while the YubiKey 5
Nano and YubiKey 5C Nano are designed to remain in the 3
“Saying Goodbye to Passwords,” Alex Simons, Manini Roy, Microsoft Ignite 2017
USB port. This ensures every YubiKey is easy to access and 4
Google Research, Security Keys: Practical Cryptographic Second Factors for the Modern Web
provides the same level of digital security. 5
Google Research, Security Keys: Practical Cryptographic Second Factors for the Modern Web

About Yubico As the inventor of the YubiKey, Yubico makes secure login easy. WebAuthn, and FIDO Universal 2nd Factor (U2F), and open authentication
As a leader in setting global standards for secure access to computers, mobile standards. For more information, please visit: www.yubico.com.
devices, and more, Yubico is also a creator and core contributor to the FIDO2,
© 2023 Yubico

You might also like