AI Buyer Insights:

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

List of Yubico Authenticator Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Dropbox Communications 1800 $2.5B United States Yubico Yubico Authenticator Identity and Access Management (IAM) 2015 n/a
In 2015, Dropbox added FIDO U2F support including YubiKeys as part of its customer-facing Identity and Access Management (IAM) to protect user accounts and cloud storage. The implementation is associated with the Yubico Authenticator application as the vendor-provided credential management tool aligned to the YubiKey hardware token workflows and OTP capabilities on YubiKeys. The deployment centered on a FIDO U2F second factor authentication module integrated into Dropbox account authentication flows, with standard functions for hardware token registration, challenge response authentication, and account sign-in protection. Configuration work included extending account security settings to support self-service YubiKey enrollment and challenge verification, and incorporating Yubico Authenticator functionality to manage one time password generation where customers used OTP-capable YubiKeys. Operationally the work impacted Dropbox customer-facing authentication and cloud storage access control across its global user base, embedding hardware-backed second factor into sign-in and account security settings. Governance adjustments focused on IAM workflow changes for token enrollment and authentication policy, ensuring the authentication stack recognized FIDO U2F assertions and allowed users to register and use YubiKeys through the account security interface. The documented 2015 U2F and YubiKey integration improved account security for Dropbox users by adding hardware-backed multi-factor options, and the Yubico Authenticator application is consistent with that integration for OTP management on YubiKeys.
Github Communications 5595 $1.0B United States Yubico Yubico Authenticator Identity and Access Management (IAM) 2015 n/a
In 2015, GitHub integrated U2F and FIDO2 support and incorporated YubiKey authentication, implementing Yubico Authenticator as part of its Identity and Access Management (IAM) strategy to secure developer accounts and the platform. The deployment is explicitly tied to developer facing IAM controls and to the 2015 rollout documented by Yubico. The implementation focused on strong second factor capabilities, adding U2F and FIDO2 verification flows and on-key credential capabilities via Yubico Authenticator. Functional modules and configuration work included multi factor enrollment and verification workflows for developer accounts, token provisioning to YubiKey devices, and retention of on-device OATH/TOTP credentials consistent with Yubico Authenticator functionality. Operationally the rollout moved from an internal beta to a global deployment across GitHub’s platform, integrating YubiKey-based authentication into platform login flows and account protection processes. The integration targeted developer accounts at scale and was executed as a platform level enhancement to Identity and Access Management (IAM), protecting millions of developer accounts according to the case study. Governance and rollout were staged, beginning with internal testing before broad distribution, and included modifications to account enrollment and authentication workflows to accommodate hardware key enrollment. The documented outcome in the source is a global deployment that protected millions of developer accounts using YubiKey and Yubico Authenticator within GitHub’s 2015 IAM implementation.
Google Communications 190820 $402.8B United States Yubico Yubico Authenticator Identity and Access Management (IAM) 2009 n/a
In 2009, Google deployed Yubico Authenticator alongside company-wide YubiKey issuance to secure employee access across its global operations. The Google Yubico Authenticator Identity and Access Management (IAM) implementation acted as an IT access control layer to enforce two-factor authentication for employee logins. Configuration emphasized hardware-backed credential storage and OATH/TOTP management on YubiKeys, reflecting capabilities common to Identity and Access Management (IAM) solutions for device-bound second factors. Functional capabilities implemented included credential provisioning, token verification at authentication time, and administrative controls for enrolled tokens. Operational coverage extended across Google’s global employee population, with management positioned inside IT and identity operations to administer enrollment and access policies. The rollout was executed as a company-wide security control, aligning Yubico Authenticator use with corporate access governance and enrollment workflows. Vendor-reported outcomes from the deployment included a 92% reduction in support incidents and noticeably faster login experiences for employees. Governance centered on centralized enforcement of two-factor authentication through the Yubico Authenticator Identity and Access Management (IAM) control, with token lifecycle management maintained by corporate identity teams.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating Yubico Authenticator

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Yubico Authenticator. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Yubico Authenticator Coverage

Yubico Authenticator is a Identity and Access Management (IAM) solution from Yubico.

Companies worldwide use Yubico Authenticator, from small firms to large enterprises across 21+ industries.

Organizations such as Google, Dropbox and Github are recorded users of Yubico Authenticator for Identity and Access Management (IAM).

Companies using Yubico Authenticator are most concentrated in Communications, with adoption spanning over 21 industries.

Companies using Yubico Authenticator are most concentrated in United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Yubico Authenticator across Americas, EMEA, and APAC.

Companies using Yubico Authenticator range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 0%, large organizations with 1,001-10,000 employees - 66.67%, and global enterprises with 10,000+ employees - 33.33%.

Customers of Yubico Authenticator include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Yubico Authenticator customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).