Skip to main content
TrustRadius
Yubico YubiKeys

Yubico YubiKeys

Overview

What is Yubico YubiKeys?

Yubico YubiKeys make the internet safer with phishing-resistant multi-factor authentication (MFA) by providing simple and secure access to computers, mobile devices, servers, and internet accounts. The Yubico YubiKey stops account takeovers at scale by mitigating phishing and ransomware attacks, and…

Read more
Recent Reviews

MFA on Your Keyring

10 out of 10
February 02, 2024
Incentivized
I have used multiple generations of Yubico YubiKeys and watched them improve over time. I like to keep them as a backup method for any …
Continue reading

Love Yubico YubiKeys!

10 out of 10
February 02, 2024
Incentivized
We use Yubico YubiKeys company-wide to secure all employee accounts. This is used for accounts on all 3rd party platforms that support it.
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.yubico.com/yubienterprise…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $3.94 per month per user
Return to navigation

Product Demos

Setting up the Security Key

YouTube
Return to navigation

Product Details

What is Yubico YubiKeys?

Yubico YubiKeys supports phishing-resistant multi-factor authentication (MFA) by providing simple and secure access to computers, mobile devices, servers, and internet accounts.

Stopping phishing attacks and account takeovers before they start
The Yubico YubiKey stops account takeovers at scale by mitigating phishing and ransomware attacks. And users experience fast and easy authentication with a simple touch or tap. For organizations that wish to secure sensitive data stored in servers, the YubiHSM offers an ultra-portable hardware security module, bringing great flexibility and affordability to any organization. For organizations that wish to secure sensitive data stored in servers, the YubiHSM offers a portable hardware security module, bringing great flexibility and affordability to any organization.

Deploying modern hardware MFA at scale
Organizational security is only effective when users adopt it. Distributing Yubico YubiKeys and onboarding users is simple and comes with expert guidance, enterprise subscriptions and global turnkey delivery services. A single Yubico YubiKey can be used right out-of-the-box across personal and work online accounts, and across 800+ IT systems and online services which makes it easier for the organization and the user to enhance protection for online accounts.

Yubico YubiKeys Features

  • Supported: Security: Two-factor, multi-factor and passwordless authentication
  • Supported: Authentication: Phishing defense using modern FIDO protocols that stops account takeovers
  • Supported: Multi-protocol capabilities: A single YubiKeys supports a range of authentication protocols such as FIDO2 (passkey)/WebAuthn, FIDO U2F, Smart card/PIV, OTP
  • Supported: Range of form factors: USB-A, USB-C, NFC enables stronger security across a range of legacy and devices
  • Supported: Supports legacy and modern environments: Secures legacy on-premises and modern cloud environments
  • Supported: Enterprise-ready: Hardware MFA available as a “YubiKeys as a Service” model to help deliver strong phishing-resistant MFA

Yubico YubiKeys Videos

Accelerating Zero Trust strategy with the YubiKey delivering strong, phishing-resistant MFA
The Bridge to Passwordless Authentication
Phishing-resistant MFA to meet new cyber insurance requirements

Yubico YubiKeys Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android

Frequently Asked Questions

Yubico YubiKeys make the internet safer with phishing-resistant multi-factor authentication (MFA) by providing simple and secure access to computers, mobile devices, servers, and internet accounts. The Yubico YubiKey stops account takeovers at scale by mitigating phishing and ransomware attacks, and delivers users authentication with a simple touch or tap.

Yubico YubiKeys starts at $3.94.

The most common users of Yubico YubiKeys are from Small Businesses (1-50 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(61)

Attribute Ratings

Reviews

(1-25 of 33)
Companies can't remove reviews or game the system. Here's why
February 16, 2024

Yubico YubiKeys Review

Score 5 out of 10
Vetted Review
Verified User
Incentivized
YubiKeys are incredibly effective for protecting against phishing attacks, as they require physical interaction and can't be remotely compromised. They're ideal for safeguarding high-value targets (executives, IT admins, those handling sensitive data), enhancing remote access security, and often help meet industry compliance regulations. However, the initial hardware cost may be a concern for large-scale deployments with many low-risk users. Users prone to losing small items or scenarios involving older, incompatible systems might pose logistical challenges. Nonetheless, YubiKeys remain robust when addressing phishing-based attacks and securing privileged accounts. Consider a targeted rollout balancing security gain against potential hardware costs and user needs.
Chris Cowherd | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
For securing your most sensitive accounts, systems, and data that require strong access controls, YubiKeys offer excellent protection by strengthening your organization's authentication strategy. Rather than relying solely on passwords or mobile-based two-factor methods for your highest-risk user logins, YubiKeys provide rock-solid multi-factor authentication tied to a tamper-resistant physical device. This eliminates many of the vulnerabilities associated with passwords and mobile authenticators alone. By requiring both a password and the possession of a YubiKey for access, you can drastically reduce the risks of unauthorized logins, even in the event of password leaks. YubiKeys also provide phishing protection by cryptographically verifying legitimate sites, preventing spoofing attacks.For infrastructure like production servers, databases, and network equipment where compromised access would be catastrophic, YubiKey-secured logins should be mandatory for administrators and engineers. Similarly for business-critical software as a service accounts and registrar/DNS logins where hijacking could shut down the business.
February 02, 2024

Yubico YubiKeys Review

Michael Cinkus | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yubico YubiKeys' bios, its physical presence, and the UV feature are really great for things like full disk encryption(LUKS2) or SSH keys(ed25519-sk). Yubico YubiKeys' bios are also very nice as backup devices since I can have the backup sitting on my desk and not have to worry about other people being able to use it.
February 02, 2024

MFA on Your Keyring

Score 10 out of 10
Vetted Review
Verified User
Incentivized
They are a great backup MFA device because it isn't safe to only have one MFA token. They are also good for anyone who doesn't want to use a smartphone as their MFA device. They have a FIPS-validated solution for anyone who works in government or government contracting.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yubico YubiKeys should be used across all business and personal applications. Yubico YubiKeys are a great way to keep access to enabled systems secure. Any online access that allows for Yubico YubiKeys should be enabled to be used with it so that in case of lost access or breach, physical YubiKey is the best way to recover.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yubico YubiKeys are great for hybrid applications that support both modern and legacy authentication methods. For example, for web-based applications that are federated behind an IdP, the Yubico YubiKey WebAuthn (FIDO2) mechanism is the gold standard of phishing-resistant MFA. The same Yubico YubiKey (if a supported model) can also be used as an OTP hardware token so that the user does not have to use 2 different roaming authenticators for logging into all their applications. One YubiKey to rule them all!
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yubico YubiKeys shines when used as part of a larger MFA solution. It provides a very flexible component, however, it remains dependent on the infrastructure and environment in which it is deployed.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yubico YubiKeys work great as smart card replacements. We utilize them in conjunction with DUO for MFA at the desktop level, and we can configure the YubiKey as a secure key for Duo, as well as configure DUO to allow logon using smart cards to bypass the DUO requirement, which simplifies Windows logon using a PIN plus the YubiKey.
February 02, 2024

Love Yubico YubiKeys!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
I love using Yubico YubiKeys everywhere it is supported. I believe it provides the best security and ease of use.

Unlike SMS or Authenticator based MFA, Yubico YubiKeys provide phishing resistance to protect against MITA. It also provides easy passwordless login which eases the user flow and decreases the need for password resets
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Data control, and for our environment, the keys help up to ensure privacy protection. HIPPA compliance is a critical need. Limiting electronic prescription writing on certain enabled laptops also fulfills a requirement. Having the Yubico key portable allows movement through the office, and not limited to a specific work station. It helps with workload efficiency.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It works well for personal home use and in my business use as well. The security of it is the key to my usage. Sometimes access is difficult, which is really not the fault of the YubiKey. Occasionally, it will need to go upside down, which creates problems.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
As long as users physically carry the Yubikey with them they can securely authenticate with our SSO architecture. The only problem with the Yubikey is limited support for mobile devices at this time. So much more secure with various threat actors targeting It infrastructure these days...
January 17, 2024

These Are the BEST

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yubico YubiKeys is excellent everywhere and always, especially as a backup to TOTP authentication. In some cases, perhaps you can't use a USB A, C or NFC, so you'll have TOTP. In other cases, you might not have your TOTP device, but you can use the USB or NFC options. Different methods of security are always nice.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The Yubikeys work well for us in both a Windows and Mac environment. Stores plenty of types of keys to cover both your AD logins and a good number of websites or custom applications for 2FA. Easy configuration with their platinum partner Userlock that also gives a huge amount of insight into user login/logoff patterns along with PC control.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
If you are needing phish resistant MFA (which YOU do!), Yubico is one of the leading brands out there -- so highly recommend them. They are very sturdy/resilient, so should last very long.

They can be not so easy to use when you are trying to authenticate from a mobile device, so areas for improvement there.
November 20, 2023

Trust beyond transaction.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Personal life protecting your most sensitive accounts. Professional life, protecting all of your accounts. IAM deployments, either through the use of a local SSO, Federated IdP, or right on the appsec stack, have demonstrated extreme value. Yubikey works well at the front door and continuous authentication deployments.
Return to navigation