Duo Two-Factor Authentication App

  • On ·
  • By ·

Easy, One-Tap Authentication

Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users quickly verify their identity by approving push notifications before accessing applications. They can easily stop fraudulent attempts to access company data by tapping the deny button.

Duo Mobile can also generate time-based one-time (TOTP) passcodes that users can type into their login prompt to complete the two-factor authentication process.

Duo Restore

Provide your users the ability to back up and restore their Duo Mobile app with Duo Restore. Enable Android and iOS Duo Mobile users to back up their Duo-protected accounts and recover them when they get a new device – no help desk ticket needed.

Security Checkup

Security Checkup is available on iOS and Android through Duo Mobile. By providing a security score of users’ devices, this feature empowers users to maintain the security hygiene of their mobile devices via Duo Mobile notifications.

Download Duo Mobile

Duo Mobile works on every device – including smartwatches. Use your Apple Watch to receive login requests on your wrist, and authenticate on your iPhone, iPad or Apple Watch. Duo Mobile for iOS also supports Touch ID, an additional layer of security to verify your users’ identities.

Duo Mobile works with Apple iOS, Google Android, Palm, Windows Phone 7, Windows Mobile 8.1 and 10, and J2ME/Symbian. Download Duo Mobile for iPhone or Duo Mobile for Android – they both support Duo Push, passcodes and third-party TOTP accounts.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at

Symantec VIP Hardware Authenticator

  • On ·
  • By ·

Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function is to be used with Symantec VIP Access. The Symantec VIP authenticator (token) can bring an extra layer of security to your accounts and protect them from unauthorized access and phishing attacks.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at

Nitrokey

  • On ·
  • By ·

The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can’t be stolen. The Nirtokey is PIN-protected and is secured against brute force and hardware attacks. Backups protect against loss.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at

Aegis Authenticator

  • On ·
  • By ·

Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an alternative to proprietary two factor authentication apps like Google Authenticator and Authy. Its most important feature, is security.

All of your one-time passwords are stored in a vault. If you choose to set a password, which is highly recommended, the vault will be encrypted using AES-256. If someone with malicious intent gets a hold of the vault file, it’s impossible for them to retrieve the contents without knowing the password.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at

Token2 Programmable Security Token

  • On ·
  • By ·

The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Google, Facebook, Coinbase, GDAX, Dropbox, GitHub, Kickstarter, Microsoft, TeamViewer, Stripe, Azure, etc.

Program the card using your NFC-enabled Android phone by scanning a QR barcode. Token2 is not currently compatible with iPhone.

The Token2 miniOTP card is easyto set up:

  1. If you have an NFC-enabled phone running Android OS, just download and run the Token2 app.
  2. Initiate the token setup on the website/system where you require enhanced security.
  3. Save the secret key in a SAFE place so that you can easily restore the security token.
  4. Scan the secret key using the Token2 app, or input it manually. We recommend the automatic method.
  5. Activate the OTP token and place it near your phone’s NFC antenna. While holding it near the NFC antenna, tap “Burn the seed” and wait for a message confirming that the 2FA token was programmed successfully.

The miniOTP-2 features unrestricted time sync to allow the internal clock to be kept up to date. This can eliminate issue with drift accumulating over several years where the clock drifts outside the synchronization window.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at

Thetis FIDO U2F Security key

  • On ·
  • By ·

Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB port.

The Thetis U2F key can be used on any websites which support U2F protocol with the latest Chrome installed on your Windows, Mac OS or Linux. Never lose your accounts through password theft, phishing, hacking or keylogging scams.

It can be used on Windows 7, Windows 8, Windows 8.1, Windows 10, Mac OS X, and Linux with latest Chrome browser or Opera browser installed.

Designed with a 360° rotating metal cover that shields the USB connector when not in use. Also, crafted from a durable aluminum alloy to protect the Key from drops, bumps and scratches.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at

YubiKey 5 NFC

  • On ·
  • By ·

The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key.

Usernames and passwords are not enough to protect your accounts. Using a security key as a form of two-factor authentication is a simple and proven method for locking down your accounts and keeping them secure. A YubiKey makes it extremely difficult to gain access or steal your most important files, pictures, emails, and financial information.

Secure your login and protect your account with hundreds of services like Gmail, Facebook, Dropbox, Twitter, Dashlane, Skype, Outlook, LastPass and more. This YubiKey delivers strong authentication over Near Field Communications (NFC) and via USB-A ports. The YubiKey is simple to register with hundreds of services. Once registered, each service will simply request you to insert and tap your YubiKey to gain access during login.

YubiKeys are tamper proof, water resistant, and crush resistant. Simple, convenient, and secure.


Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users
OnlyKey is a hardware password manager that you can take with you everywhere to stay secure online. PROTECT ONLINE ACCOUNTS – A password manager, two-factor
Beryl is a high-performance new generation pocket-sized router that offers powerful hardware and first-class cybersecurity protocol with unique and modern design. It comes with dual-band
Secure Your Communications with ProtonMail! ProtonMail is incorporated in and all servers are located in Switzerland. This means all user data is protected by strict
Oxen is many things. A private cryptocurrency. A secure messaging platform. A network anonymity layer. Tools to build a more private future for the Internet.
The Librem 14 by Purism is the first 14” laptop designed to protect your digital life. Ultra-portable workstation laptop that was designed chip-by-chip, line-by-line, to
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Privacy & Security Brainiacs provides trusted tools to help the smallest to largest organizations effectively, efficiently and affordably meet their information security, privacy and compliance
Put a lock on your cloud with Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards
Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint
Whether you're storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens:
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host
As we've transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use &
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at