• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Mobility, Network Security, News

Yubico Releases USB-C, NFC Security Key

Company's new Security Key C NFC is a USB-C and near-field communication (NFC) is designed to meet demand as more devices leverage USB-C.

October 26, 2021 TD Staff Leave a Comment

Yubico USB-C NFC

Security key maker Yubico has released new USB-C and near-field communication (NFC) security keys to meet demand as more devices leverage USB-C.

The company’s Security Key C NFC is the latest to join its portfolio of security keys, offering FIDO-only support in a USB-C form factor with NFC capabilities. This joins the Security Key NFC, a USB-A and NFC-capable key.

Like the company’s other security keys, it provides enhanced, the Security Key C NFC is designed to bring users modern security for applications, services and user accounts for both desktop and mobile authentication, according to Yubico.

Unlike text, email or software-based methods of multi-factor authentication, security keys provide another layer of authentication that is nearly impossible to compromise.

According to Yubico, both devices in the Security Key Series support Fido U2F and FIDO2/WebAuthn, which the company says is based on its invention of enabling one single authenticator to work across any umber of applications.

“There are many forms of MFA, but not all are created equal,” the company said in a press release. “FIDO-based authentication is the only method proven to protect against phishing and man-in-the-middle attacks.”

According to the company, the security key works with “hundreds of popular websites and applications,” including Gmail, YouTube, Dropbox, Twitter, Coinbase, Microsoft accounts including Office 365) and more, as well as password managers, social media networks, productivity applications and cryptocurrency exchanges.

The company is hosting a Twitter Spaces event Wednesday with Twitter employees to discuss the benefits of using a hardware security key to secure both business and personal accounts. The company also plans to highlight its YubiEnterprise Services and YubiEnterprise Delivery programs designed to equip large organizations with a suite of security keys both remotely and in-office.

The Security Key C NFC can be purchased on the company’s online store on via Amazon for $29.

Related Content:

  • Zoom macOS Update Zoom on macOS Devices Now
  • DDoS, NETSCOUT Arbor Insight NETSCOUT Launches Arbor Insight for Enhanced DDoS Prevention
  • AWS Private 5G Amazon Launches AWS Private 5G For Connected Environments
  • Mindbody wellness tech WalkMe Mindbody Enlists WalkMe to Drive Digital Transformation

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.