Search
  • Videos
  • Enterprise Software
  • Windows 10
  • Cloud
  • AI
  • Security
  • TR Premium
  • more
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Enterprise Software
    • Windows 10
    • Cloud
    • AI
    • Security
    • TR Premium
    • 5G Guide
    • Build a Website
    • Hardware
    • Innovation
    • Best Smartphones
    • Executive Guides
    • Best VPN Services
    • Web Hosting
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

YubiKey by Yubico

8 of 8 NEXT PREV
  • YubiKey 4

    YubiKey 4

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • YubiKey 4

    YubiKey 4

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • ​Minimalist packaging.

    ​Minimalist packaging.

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • YubiKey 4 and YubiKey FIDO U2F

    YubiKey 4 and YubiKey FIDO U2F

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • YubiKey 4 connected to MacBook

    YubiKey 4 connected to MacBook

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • YubiKey range

    YubiKey range

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • Authenticating with Facebook

    Authenticating with Facebook

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

  • Authenticating with Google

    Authenticating with Google

    Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

    Caption by: Adrian Kingsley-Hughes

8 of 8 NEXT PREV
Adrian Kingsley-Hughes

By Adrian Kingsley-Hughes for Hardware 2.0 | February 2, 2017 -- 15:47 GMT (07:47 PST) | Topic: Security

  • YubiKey 4
  • YubiKey 4
  • ​Minimalist packaging.
  • YubiKey 4 and YubiKey FIDO U2F
  • YubiKey 4 connected to MacBook
  • YubiKey range
  • Authenticating with Facebook
  • Authenticating with Google

YubiKey offers a quick, cost-effective and simple way to protect your data, both online and offline, whether for personal use, business, enterprise, or even developers.

Read More Read Less

Authenticating with Google

Published: February 2, 2017 -- 15:47 GMT (07:47 PST)

Caption by: Adrian Kingsley-Hughes

8 of 8 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Adrian Kingsley-Hughes

By Adrian Kingsley-Hughes for Hardware 2.0 | February 2, 2017 -- 15:47 GMT (07:47 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • The Nightmare in Silicon Valley: 8 horror technologies that should scare you to death

    Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.

  • Julia programming language, cloud computing, cybersecurity worries: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

  • YubiKey 5Ci: USB-C and Lightning Security Key

    The world’s first Lightning-compatible security key

  • 10 Linux distros: From different to dangerous

    One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're ...

  • 2019's tech, security, and authentication trends

    We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, ...

  • The world's most famous and dangerous APT (state-developed) malware

    A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military ...

  • Best-paid tech jobs, malware warnings and shadow IT: Research round-up

    All the facts and figures that matter to you and your business from the past month in technology news.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums