sb-nz logo
Story image

Yubico rolls out subscription service for hardware authentication keys

01 Oct 2020

Yubico is pushing further into the Asia Pacific market with the announcement of its first regional client aboard the company’s new global YubiEnterprise Subscription.

Historically, Yubico sold its hardware authentication security keys, called YubiKeys, on a per-device basis. The company expanded its offerings through the YubiEnterprise Subscription service, which is an as-a-service offering on a per user basis.

The YubiEnterprise subscription is available through channel partners in Australia, New Zealand, and worldwide.

“YubiEnterprise Subscription provides considerable cost and time savings, helping organisations to simplify their approach to strong authentication as their business evolves,” says Yubico EMEA and APAC senior vice president Fredrik Krantz. 

“With immediate success from the initial roll out in the US and Canada, we are proud to now offer YubiEnterprise Subscription to our APAC channel partners.” 

Australian-based Yubico reseller partner NQBE scored the deal with the regional council. Although the information is scarce at present, NQBE CEO Andrew Phillips says that security threats evolve rapidly, which means protection technologies must also evolve too – and a subscription service can ensure that these technologies are up to date.

"The YubiEnterprise Subscription model was very appealing to us in terms of our annual IT budget as it lowered the cost of entry, allowed us to spread the payments across the year and shifted our IT spending from capital expenditure to operating expenditure.” 

"The user-based pricing model enables us to reassign subscriptions to new users, request replacement YubiKeys, get free upgrades when new YubiKeys come out and even order buffer stock for peak periods,” he continues.

"This will make it even easier for our customers to successfully implement projects quickly. It offers them unlimited access to Yubico's security experts to help with the rollout and onboarding process, as well as priority problem handling and dedicated support." 

Yubico recently released a new NFC-capable version of its YubiKey. The 5C NFC is able to provide authentication through near-field communication (NFC) and USB-C connections. The key supports multiple authentication protocols including: FIDO2 and WebAuthn, FIDO U2F, PIV (smart card), OATH-HOTP and OATH-TOTP (hash-based and time-based one-time passwords), OpenPGP, YubiOTP, and challenge-response.

YubiKey 5C NFC can be used to authenticate across platforms including iOS, Android, Windows, macOS and Linux — and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.

Through YubiEnterprise Subscription and YubiEnterprise Delivery, organizations can deploy YubiKey authentication at scale, regardless of employee locations. IT administrators can upgrade to the latest YubiKey form factors, including the YubiKey 5C NFC.

Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
ABB and Nozomi Networks extend collaboration, deliver improved OT security solutions
"With Nozomi Networks solutions added to our cybersecurity portfolio, our customers gain proven network monitoring and threat detection technology."More
Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More
Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Cybersecurity budgets still not keeping up with threats — report
Executive teams are failing to recognise the level of damage cyber-threats pose to organisations, according to Sophos — many of them taking a ‘conservative approach’ to cybersecurity expenditure.More