filmov
tv
Not all MFA is created equal: YubiKey delivers phishing-resistant authentication
![preview_player](https://i.ytimg.com/vi/ad_dQn_X9mY/maxresdefault.jpg)
Показать описание
The YubiKey is the gold standard of authentication. Legacy mobile-based authenticators like SMS and push apps can be easily phished. Discover how the YubiKey offers highest-assurance, phishing-resistant multi-factor authentication (MFA) available that stops modern cyber threats for the worlds largest organizations and individuals across the globe.
Strongest security with true phishing-resistant MFA
Legacy MFA like SMS, mobile auth and OTP are all vulnerable to phishing. And while there may be many solutions that claim to be phishing resistant, the simple fact is this – if it is not Smart card/PIV or modern FIDO authentication-based, it is not phishing-resistant!
Stay protected with the strongest level of authentication security, and stop account takeovers in their tracks by considering modern, phishing-resistant MFA using hardware security keys based on smart card/PIV, or modern FIDO authentication.
Offer the best user experience
SMS, one time passwords and mobile authenticators are cumbersome to use and hinder productivity. They are also easily breached via man-in-the-middle and phishing attacks. The top two data breach attack vectors today are phishing attacks and stolen credentials (source: Verizon 2019 Data Breach Investigation Report).
YubiKeys offer the best of both worlds – the best available security against phishing attacks and account takeovers, as well as the best user experience. To authenticate, users simply tap/touch their security key. YubiKeys also don’t require batteries, have no breakable screens, don’t need a cellular connection, and are water-resistant and crush-resistant.
Bridge legacy MFA to modern protocols
Most traditional MFA methods are insecure. SMS, one time passwords, and even mobile push authenticators are susceptible to account takeover attacks from phishing and man-in-the-middle attacks.
YubiKeys feature modern protocols like FIDO2 and WebAuthn, as well as OTP, SmartCard (PIV), OpenPGP, earlier FIDO versions, and more. A single key supports multiple applications, allowing YubiKeys to work with current applications and authentication methods, and advanced and emerging protocols at the same time.
Strongest security with true phishing-resistant MFA
Legacy MFA like SMS, mobile auth and OTP are all vulnerable to phishing. And while there may be many solutions that claim to be phishing resistant, the simple fact is this – if it is not Smart card/PIV or modern FIDO authentication-based, it is not phishing-resistant!
Stay protected with the strongest level of authentication security, and stop account takeovers in their tracks by considering modern, phishing-resistant MFA using hardware security keys based on smart card/PIV, or modern FIDO authentication.
Offer the best user experience
SMS, one time passwords and mobile authenticators are cumbersome to use and hinder productivity. They are also easily breached via man-in-the-middle and phishing attacks. The top two data breach attack vectors today are phishing attacks and stolen credentials (source: Verizon 2019 Data Breach Investigation Report).
YubiKeys offer the best of both worlds – the best available security against phishing attacks and account takeovers, as well as the best user experience. To authenticate, users simply tap/touch their security key. YubiKeys also don’t require batteries, have no breakable screens, don’t need a cellular connection, and are water-resistant and crush-resistant.
Bridge legacy MFA to modern protocols
Most traditional MFA methods are insecure. SMS, one time passwords, and even mobile push authenticators are susceptible to account takeover attacks from phishing and man-in-the-middle attacks.
YubiKeys feature modern protocols like FIDO2 and WebAuthn, as well as OTP, SmartCard (PIV), OpenPGP, earlier FIDO versions, and more. A single key supports multiple applications, allowing YubiKeys to work with current applications and authentication methods, and advanced and emerging protocols at the same time.
Комментарии