List of Yubico Authenticator Customers
Since 2010, our global team of researchers has been studying Yubico Authenticator customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Yubico Authenticator for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Yubico Authenticator for Identity and Access Management (IAM) include: Google, a United States based Communications organisation with 190820 employees and revenues of $402.84 billion, Dropbox, a United States based Communications organisation with 1800 employees and revenues of $2.55 billion, Github, a United States based Communications organisation with 5595 employees and revenues of $1.00 billion and many others.
Contact us if you need a completed and verified list of companies using Yubico Authenticator, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Yubico Authenticator customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Dropbox | Communications | 1800 | $2.5B | United States | Yubico | Yubico Authenticator | Identity and Access Management (IAM) | 2015 | n/a |
In 2015, Dropbox added FIDO U2F support including YubiKeys as part of its customer-facing Identity and Access Management (IAM) to protect user accounts and cloud storage. The implementation is associated with the Yubico Authenticator application as the vendor-provided credential management tool aligned to the YubiKey hardware token workflows and OTP capabilities on YubiKeys.
The deployment centered on a FIDO U2F second factor authentication module integrated into Dropbox account authentication flows, with standard functions for hardware token registration, challenge response authentication, and account sign-in protection. Configuration work included extending account security settings to support self-service YubiKey enrollment and challenge verification, and incorporating Yubico Authenticator functionality to manage one time password generation where customers used OTP-capable YubiKeys.
Operationally the work impacted Dropbox customer-facing authentication and cloud storage access control across its global user base, embedding hardware-backed second factor into sign-in and account security settings. Governance adjustments focused on IAM workflow changes for token enrollment and authentication policy, ensuring the authentication stack recognized FIDO U2F assertions and allowed users to register and use YubiKeys through the account security interface.
The documented 2015 U2F and YubiKey integration improved account security for Dropbox users by adding hardware-backed multi-factor options, and the Yubico Authenticator application is consistent with that integration for OTP management on YubiKeys.
|
|
|
Github | Communications | 5595 | $1.0B | United States | Yubico | Yubico Authenticator | Identity and Access Management (IAM) | 2015 | n/a |
In 2015, GitHub integrated U2F and FIDO2 support and incorporated YubiKey authentication, implementing Yubico Authenticator as part of its Identity and Access Management (IAM) strategy to secure developer accounts and the platform. The deployment is explicitly tied to developer facing IAM controls and to the 2015 rollout documented by Yubico.
The implementation focused on strong second factor capabilities, adding U2F and FIDO2 verification flows and on-key credential capabilities via Yubico Authenticator. Functional modules and configuration work included multi factor enrollment and verification workflows for developer accounts, token provisioning to YubiKey devices, and retention of on-device OATH/TOTP credentials consistent with Yubico Authenticator functionality.
Operationally the rollout moved from an internal beta to a global deployment across GitHub’s platform, integrating YubiKey-based authentication into platform login flows and account protection processes. The integration targeted developer accounts at scale and was executed as a platform level enhancement to Identity and Access Management (IAM), protecting millions of developer accounts according to the case study.
Governance and rollout were staged, beginning with internal testing before broad distribution, and included modifications to account enrollment and authentication workflows to accommodate hardware key enrollment. The documented outcome in the source is a global deployment that protected millions of developer accounts using YubiKey and Yubico Authenticator within GitHub’s 2015 IAM implementation.
|
|
|
Communications | 190820 | $402.8B | United States | Yubico | Yubico Authenticator | Identity and Access Management (IAM) | 2009 | n/a |
In 2009, Google deployed Yubico Authenticator alongside company-wide YubiKey issuance to secure employee access across its global operations. The Google Yubico Authenticator Identity and Access Management (IAM) implementation acted as an IT access control layer to enforce two-factor authentication for employee logins.
Configuration emphasized hardware-backed credential storage and OATH/TOTP management on YubiKeys, reflecting capabilities common to Identity and Access Management (IAM) solutions for device-bound second factors. Functional capabilities implemented included credential provisioning, token verification at authentication time, and administrative controls for enrolled tokens.
Operational coverage extended across Google’s global employee population, with management positioned inside IT and identity operations to administer enrollment and access policies. The rollout was executed as a company-wide security control, aligning Yubico Authenticator use with corporate access governance and enrollment workflows.
Vendor-reported outcomes from the deployment included a 92% reduction in support incidents and noticeably faster login experiences for employees. Governance centered on centralized enforcement of two-factor authentication through the Yubico Authenticator Identity and Access Management (IAM) control, with token lifecycle management maintained by corporate identity teams.
|
Buyer Intent: Companies Evaluating Yubico Authenticator
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||