Secure and safe authentication for shared PCs: Security key - YubiKey.
YubiKey is one of the devices known as "security keys (hardware tokens)" that can be used for the highest level of security in multi-factor authentication. The basic way to use a YubiKey is simply to insert it into a USB port and touch it. It can be used on various operating systems without the need for dedicated software or drivers. The number of supported services is increasing year by year, and it is gaining attention as a next-generation security solution. Manufactured by Yubico, based in the United States and Sweden, YubiKey supports the latest protocols such as FIDO2 as well as traditional authentication protocols like TOTP, enabling strong two-factor authentication, multi-factor authentication, and passwordless authentication with a single tap. However, one of the factors hindering its adoption is the cost and effort involved in implementation. To reduce the burden at the time of adoption and make a more robust security solution accessible, a subscription service called YubiKey as a Service is also available.
Inquire About This Product
basic information
Main Features of YubiKey ■ Possession + Knowledge two-factor authentication (PIN input → touch to use) ■ Possession + Biometric (fingerprint authentication version) ■ High robustness and waterproofing ■ Most interfaces available ■ Industry leader Benefits of Introducing YubiKey as a Service ■ Reduction of initial costs ■ Flexibility ■ Investment in the future ■ Effective implementation with comprehensive support For more details, visit https://www.cloudgate.jp/lineup/yubikey-as-a-service.html
Price range
Delivery Time
Applications/Examples of results
For more details about YubiKey, please see here: https://www.cloudgate.jp/yubikey.html For more details about YubiKey as a Service, please see here: https://www.cloudgate.jp/lineup/yubikey-as-a-service.html
catalog(3)
Download All CatalogsCompany information
International System Research Co., Ltd. is developing cloud business in collaboration with market leaders in cloud security, Google and Salesforce. In addition to our 100% in-house developed service 'Cloud Gate', our company leverages its high technical capabilities, based on a wealth of experience in developing numerous web applications, including smartphone applications, to provide customers with high-quality products and services.