sb-as logo
Story image

Yubico rolls out subscription service for hardware authentication keys

01 Oct 2020

Yubico is pushing further into the Asia Pacific market with the announcement of its first regional client aboard the company’s new global YubiEnterprise Subscription.

Historically, Yubico sold its hardware authentication security keys, called YubiKeys, on a per-device basis. The company expanded its offerings through the YubiEnterprise Subscription service, which is an as-a-service offering on a per user basis.

The YubiEnterprise subscription is available through channel partners in Australia, New Zealand, and worldwide.

“YubiEnterprise Subscription provides considerable cost and time savings, helping organisations to simplify their approach to strong authentication as their business evolves,” says Yubico EMEA and APAC senior vice president Fredrik Krantz. 

“With immediate success from the initial roll out in the US and Canada, we are proud to now offer YubiEnterprise Subscription to our APAC channel partners.” 

Australian-based Yubico reseller partner NQBE scored the deal with the regional council. Although the information is scarce at present, NQBE CEO Andrew Phillips says that security threats evolve rapidly, which means protection technologies must also evolve too – and a subscription service can ensure that these technologies are up to date.

"The YubiEnterprise Subscription model was very appealing to us in terms of our annual IT budget as it lowered the cost of entry, allowed us to spread the payments across the year and shifted our IT spending from capital expenditure to operating expenditure.” 

"The user-based pricing model enables us to reassign subscriptions to new users, request replacement YubiKeys, get free upgrades when new YubiKeys come out and even order buffer stock for peak periods,” he continues.

"This will make it even easier for our customers to successfully implement projects quickly. It offers them unlimited access to Yubico's security experts to help with the rollout and onboarding process, as well as priority problem handling and dedicated support." 

Yubico recently released a new NFC-capable version of its YubiKey. The 5C NFC is able to provide authentication through near-field communication (NFC) and USB-C connections. The key supports multiple authentication protocols including: FIDO2 and WebAuthn, FIDO U2F, PIV (smart card), OATH-HOTP and OATH-TOTP (hash-based and time-based one-time passwords), OpenPGP, YubiOTP, and challenge-response.

YubiKey 5C NFC can be used to authenticate across platforms including iOS, Android, Windows, macOS and Linux — and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.

Through YubiEnterprise Subscription and YubiEnterprise Delivery, organizations can deploy YubiKey authentication at scale, regardless of employee locations. IT administrators can upgrade to the latest YubiKey form factors, including the YubiKey 5C NFC.

Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
Fujitsu new tech ensures inter-business data trust
The technology can verify when and by whom the data was created, and whether it has been tampered with, to ensure trusted data exchange.More
Story image
Palo Alto Networks extends cloud native security platform with new modules
Palo Alto Networks has announced the availability of Prisma Cloud 2.0, including four new cloud security modules, thus extending its Cloud Native Security Platform (CNSP). More
Story image
Video: 10 Minute IT Jams – A glimpse inside a ransomware cell
This is our second IT Jam with SonicWall senior manager of product marketing Brook Chelmo, and in this video Brook walks us through his one-on-one experience with a member of a ransomware cell. More
Story image
Zoom to begin rolling out end-to-end encryption
Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May following backlash that the company was lax on its security and privacy.More