What Integrates with Yubico YubiKey?

Find out what Yubico YubiKey integrations exist in 2024. Learn what software and services currently integrate with Yubico YubiKey, and sort them by reviews, cost, features, and more. Below is a list of products that Yubico YubiKey currently integrates with:

  • 1
    Securden Unified PAM Reviews
    See Software
    Learn More
    Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards.
  • 2
    Psono Reviews

    Psono

    esaqa GmbH

    Free
    19 Ratings
    See Software
    Learn More
    Psono, a self-hosted and open-source password manager, prioritizes keeping your data secure. It encrypts and stores your credentials in a manner accessible only to you, while also offering encrypted access-sharing with your team. Boasting a range of features, Psono facilitates easier data management and password accessibility than ever before. Its multi-level encryption begins with client-side encryption, ensuring genuine end-to-end encryption for password sharing, and is further bolstered by SSL and storage encryption. The complete code is subject to transparent public audit possibilities, underscoring that true security stems from precise encryption rather than the obfuscation of security weaknesses. Opting for a self-hosted credential manager like Psono allows you enhanced access control and eliminates dependency on public services for data storage, asserting itself as one of the most secure password managers that genuinely prioritizes client online safety on user-hosted servers.
  • 3
    Securden Password Vault Reviews
    See Software
    Learn More
    Securden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS).
  • 4
    Securden Endpoint Privilege Manager Reviews
    See Software
    Learn More
    Identify and populate all local administrator accounts on endpoints across your IT network. Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission based system for smooth employee experience. Discover and add applications that require elevated privileges to run automatically. Whitelist and blacklist applications using comprehensive application control policies. Enforce principle of least privilege and principle of zero-trust across the organization. Comply with industry regulations with complete audit trails and record all activities. Track application usage across the organization using comprehensive reports and gain insights that help you with creating policies for smoother experience.
  • 5
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 6
    Bitwarden Reviews
    Top Pick

    Bitwarden

    Bitwarden

    $4 per month
    11 Ratings
    With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
  • 7
    Tovuti LMS Reviews
    Top Pick
    Tovuti, a cloud-based, all-in-one solution, is designed to unleash the potential of organizations by creating, delivering, and tracking online education and training. The complete solution provides everything users need to create amazing eLearning programs for their team, customers, or partners. Features include: Course authoring, interactive content (including interactive video), live video conferencing, social communities, gamification, badges/certifications, reports/analytics, quizzes/assessments, user management, event management, eCommerce, subscription management, notifications (including geofenced notifications), instant messaging, blended learning, micro-learning, asynchronous learning, synchronous learning, directories, mobile learning and more. Tovuti also offers a complete content management system (CMS), and the ability to host one or several websites with different branding through its brand manager.
  • 8
    Hideez Reviews
    Hideez Authentication Service is a top-of-the-line security solution suitable for businesses of all sizes. This comprehensive service provides a range of features that enhance security and streamline access control, including password management, multi-factor authentication, passwordless SSO, and various other security tools. With Hideez Service, businesses can easily manage all of their passwords, securely store them in an encrypted hardware token (Hideez Keys), or try passwordless authentication and contactless desktop logins with the mobile app (Hideez Authenticator). Hideez Server manages authentication tokens, centralizes endpoints associated with them, and stores digital identity information, such as roles, permissions, and other settings. The Hideez Authentication Service is an ideal solution for companies looking to enhance their security posture and streamline authentication processes in multi-user environments. With its range of features and customizable solutions, it's perfect for businesses of all sizes. Consider adding Hideez Authentication Service to your business software and services comparison directory to help your customers find the best security solution for their needs.
  • 9
    Secret Double Octopus Reviews

    Secret Double Octopus

    Secret Double Octopus

    $3/month/user
    SDO offers end-to-end workforce passwordless authentication and desktop MFA solutions for enterprise workforces. The Octopus Authentication Platform plugs into VPNs for more secure remote access, VDI and SSO portals such as Okta SSO, Ping Identity, Microsoft ADFS and ForgeRock. The solution can integrate into Okta Verify or ForgeRock MFA, as well as integrate with Cisco Duo or RSA SecureID. It is the most flexible and complete way to go passwordless in the market today. Password management tools become obsolete in a world where SDO eliminates the password, lowering help desk costs. As a FIDO2-certified server, Secret Double Octopus supports any FIDO2-certified key such as Yubico, Feitian and Google's Titan key. Secret Double Octopus is the perfect next generation authentication solution for Zero Trust network access and re-architecture initiatives.
  • 10
    SparkView Reviews

    SparkView

    beyond SSL

    $60 per year
    Remote access to desktops and applications is fast, secure, and reliable. SparkView is a secure and simple way to connect devices that are not trusted to your desktops or applications. ZTNA, which does not require any client installation, provides secure remote access to any device that has a browser. All via HTML5 technology. The solution for mobile and remote work. Best web RDP client - advantages of SparkView: - ZTNA compliant remote access to applications, desktops and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
  • 11
    RevBits Privileged Access Management Reviews
    Secure and Protect Privileged Credentials, Sessions, and Accounts Everywhere! RevBits Privileged Access Management offers six-in-one solutions that include privileged access, privileged session and password, service accounts and key and certificate management, extensive session logging, keystrokes and video capture, and extensive session logging. Native clients for RevBits Privileged access Management are available on common operating systems. As organizations need to manage access in a more comprehensive manner, so will the number of vendors that they use. RevBits Privileged Access Management was designed to provide comprehensive access management and reduce vendor onboarding. Organizations can manage their access with five integrated modules. Product Features: Hardware Tokens Comprehensive Platform Coverage Password Management - Customizable Audit Logs - Extensive Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 12
    Authentiq Reviews

    Authentiq

    Authentiq

    $49
    Strong authentication without passwords Secure authentication options can be added to any website or app. It's simple and easy. Authentiq Connect allows users to decide when to increase their security and whether they want to use a second factor such as TOTP (e.g. Google Authenticator or U2F (e.g. Yubikey, or you can go passwordless right away with AuthentiqID. Authentiq Connect works with OAuth 2.0, OpenID Connect and is easy to add a social network button on a site. Authentiq Connect works with OAuth 2.0, OpenID Connect. All you have to do is add a social network button on a site. You can have the passwordless experience that you want without locking yourself in. Authentiq ID allows you to use your smartphone to authenticate online, share your identity details securely, and sign out again remotely. It also replaces Google Authenticator with more secure TOTP authentication. This makes it a one-stop-app that is suitable for everyone.
  • 13
    1Kosmos Reviews
    1Kosmos allows citizens, customers, and workers to transact securely with digital services through passwordless access. The BlockID platform unites identity proofing with strong authentication to create a distributed digital identity that prevents identity fraud, account takeover, identity impersonation, and fraud while providing frictionless user experiences. BlockID is the only NIST-, FIDO2 and iBeta certified platform that performs millions upon daily authentications for some of the most important banks, telecommunications, and healthcare organizations around the globe.
  • 14
    cloudtamer.io Reviews
    The best cloud management software. Cloud rules, such as "deny creation public objects", can be applied once and will automatically apply to new accounts. You can also view all your policies on your org chart. Comprehensive Cloud Boundaries. Provision of self-service accounts View a detailed Org Chart. Receive alerts and cut down on spending when you reach your limit. Reduce your cloud bill by 30% Create spend plans that are consistent with your real-life plan across all your cloud providers. Our compliance checks can be used to automatically align with established standards such as NIST and CIS, or you can create your own. You can then fix issues automatically or as needed in the dashboard. Get financial control in the cloud by setting up auto-governed accounts and running compliance checks. We'll take your money if you're not impressed. We automate cloud account provisioning and drastically reduce setup time.
  • 15
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 16
    Nok Nok S3 Authentication Reviews
    Authentication is the "frontdoor" to digital services. The Nok Nok™, S3 Authentication Suite (S3 Suite), provides passwordless authentication that's more user-friendly than legacy authentication and is more secure then legacy 2FA. This results in better user engagement and greater security. From seamless on-boarding and progressive profiling to easy bootstrapping new devices and account recovery to suspension and deprovisioning users. Passwordless authentication for Desktop Web, Mobile Web and Mobile Apps. Also, integration for authenticating with call centers. Authentication to cloud services, and - when used with the Nok Nok IoT SDK - to IoT devices. Nok Nok passwordless customer authentication platform provides omnichannel, frictionless authentication for any device. The platform's extensible architecture makes it possible to support third-party biometric products and new authenticators.
  • 17
    Cmd Reviews
    This powerful, lightweight security platform provides insight observability, proactive controls and threat detection for your Linux infrastructure in the datacenter or cloud. Your cloud infrastructure is a multi-user environment. It is not possible to protect it with security products that were originally designed for endpoints. You need to think beyond analytics and logging solutions, which lack the context and workflows necessary for infrastructure security. Cmd's infrastructure detection platform and response platform is designed for today's agile security teams. Rich filters and triggers allow you to view system activity in real-time or search through stored data. Our eBPF sensors, contextual model, and intuitive workflows allow you to gain insight into user activity, running process, and access to sensitive resource. No advanced Linux administration knowledge is required. To complement traditional access management, create guardrails and controls around sensitive actions.
  • 18
    RevBits Zero Trust Network Reviews
    The RevBits Zero Trust Network, (ZTN), helps you isolate and protect your internal assets by moving the network perimeter to the endpoint. RevBits Zero Trust Network, (ZTN), moves the network perimeter to the user. This helps protect and isolate internal network assets without the need for complex network segmentation. RevBits ZTN is focused on protecting network resources, such as applications, services, accounts, and assets. It trusts no one by default, regardless of whether they are inside or outside the network. Implementing a zero-trust architecture is now easier than ever.
  • 19
    AuthLite Reviews

    AuthLite

    AuthLite

    $500 per year
    AuthLite protects your Windows enterprise network authentication while staying within your budget. Unlike other multi-factor authentication solutions, AuthLite technology teaches Active Directory how to understand two-factor authentication. AuthLite allows you to continue using your existing software while adding two-factor authentication security where you need it. AuthLite reduces the vulnerability to the "Pass the Hash (PtH), attack vector on administrative accounts by limiting the privileges that a user is allowed to access. Two-factor authentication is required before the domain admins group SID can be granted. AuthLite can be used with your existing RDP servers or software. RDP client software and drivers do not need to be modified. Two-factor authentication protects your account logon even if you are offline. To support cached/offline logon, AuthLite uses strong cryptographic HMAC/SHA1 Challenge/response features of the YubiKey token.
  • 20
    Kion Reviews
    Only single platform solution for setup, provisioning, financial management, compliance. Kion is the only platform that offers cloud enablement for AWS Azure, Google Cloud, and Google Cloud. This allows for cloud management and governance, as well as cloud governance. To automate the entire cloud lifecycle, you can create accounts, gain enterprise-wide visibility, and integrate the cloud with your tech stack. Kion automates the provisioning of accounts, with proper controls over budget and allowed services. This helps you get started correctly in the cloud. To comply with industry standards and business practices, prevent, detect, report, then remediate problems. Track and allocate spending, track it, get forecasted and real-time data, identify savings opportunities and enforce budgets. We offer more than just cloud management and governance features.
  • 21
    Powertech Multi-Factor Authentication Reviews
    Multi-factor authentication (MFA), as required by the latest version of Payment Card Industry Data Security Standard, is required for all administrator access to the cardholder data environment. MFA simplifies compliance with data privacy mandates like HIPAA or GDPR. Powertech Multi-Factor Authentication makes it possible to implement MFA in your environment, including systems such as IBM i. It is easy to prove compliance with robust auditing and reporting capabilities. Modern threats don't just require passwords. Attackers are skilled at stealing login credentials today, and half of users reuse passwords. This level of risk is unacceptable given the increased number of employees who log into networks remotely. Powertech Multi-Factor Authentication provides an additional layer of security to your existing access protection controls. This greatly reduces the damage that compromised passwords can cause.
  • 22
    Intercede Reviews
    MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability.
  • 23
    STEX Reviews
    STEX, formerly stocks.exchange, is a crypto currency exchange based out of Seychelles. Data Protection Corporation operates this site. All services offered by STEX are available to you at all times. A powerful crypto trading platform for those who trade to make money. Get the mobile STEX cryptocurrency trading app now. Trade anywhere, anytime. STEX trading app gives you quick access to your account, allows you to monitor the prices, and allows you to exchange your assets to BTC or ETH, LTC or USDT. Trading features include price and depth charts, price alert notifications, price change notifications, limit and stop-limit order, favorite market checkbox, and trading referral program. General features include 3 languages support, in app news, fingerprint access (if supported by the device), and PIN-code quick login. Email withdrawal confirmation, wallet service, 24h support service. Instant Login with Google, Microsoft, and Linkedin accounts
  • 24
    Anitian SecureCloud Reviews
    Federal Risk and Authorization Management Program (FedRAMP), is a complicated and resource-consuming process. But it doesn't have be. SecureCloud by Anitian for compliance automation is the only platform that has been proven to significantly accelerate FedRAMP audit readiness and compliance, while also saving you time and money. Anitian's solution comes in four pre-built stacks that will help you significantly accelerate your FedRAMP compliance time-to market and time-to comply. Anitian offers a pre-built, standardized environment. You just need to migrate your data and fill out some documents and you are ready for your auditor. Our cloud-compliant architecture is deployed on AWS or Azure. Our automation configures all controls to meet 3PAO requirements. It ensures data integrity and security and helps you retain control. Let us take the guesswork out compliance. SecureCloud compliance automation is pre-configured for compliance.
  • 25
    BeyondTrust Cloud Privilege Broker Reviews
    Cloud Privilege Broker provides your team with the tools to visualize, manage and monitor entitlements across multi-cloud infrastructure. A centralized dashboard that is cloud-agnostic and provides key metrics. Continuous discovery of users, roles and policies across all cloud platforms. From a single interface, you can make granular policy recommendations for IaaS and PaaS platforms. BeyondTrust Cloud Privilege Broker is an entitlements and authorizations management solution that allows customers to visualize and manage cloud access risks in hybrid and multi-cloud environments. It can be accessed from one interface. Each cloud service provider has its access management tools. However, they are limited to their own environments and cannot be extended to other providers. Teams are left to move from console to console trying to manage permissions for each cloud provider. There are also different ways to apply policy to each platform.
  • Previous
  • You're on page 1
  • Next