Security Tokens

In Stock Items
Icon/Action/GridGridIcon/Action/GuidelinesList
Sort by:
Icon/Action/GridGridIcon/Action/GuidelinesList
Sort by:
Yubico 2-Factor Authentication (2FA) Security Key, USB-C or NFC, FIDO U2F/FIDO2 Certified, Black
Yubico - Security Key NFC - Black - Two-Factor authentication (2FA) Security Key, Connect via USB-A or NFC, FIDO U2F/FIDO2 Certified
Yubico - YubiKey 5 Nano - Two-factor authentication (2FA) Security key, Connect via USB-A, Compact size, FIDO certified - Protect your online accounts
Yubico - YubiKey 5C Nano - Two-Factor authentication (2FA) Security Key, Connect via USB-C, Compact Size, FIDO Certified - Protect Online Accounts
Yubico - YubiKey 5C NFC - Two-Factor authentication (2FA) Security Key, Connect via USB-C or NFC, FIDO Certified - Protect Your Online Accounts
Yubico - YubiKey 5C - Two-factor authentication (2FA) security key, connect via USB-C, FIDO certified - Protect your online accounts
Yubico - YubiKey 5 NFC - Two-Factor authentication (2FA) Security Key, Connect via USB-A or NFC, FIDO Certified - Protect Your Online Accounts
Yubico - YubiKey 5Ci - Two-Factor authentication Security Key for Android/PC/iPhone, Dual connectors for Lighting/USB-C - FIDO Certified
1

You deal with highly confidential materials on a daily basis, whether it's for work or for home, and it's critically important that these sensitive documents remain private and secure. Security tokens can be used to ensure files can only be accessed and seen by you and you alone.Step up your network security with a variety of security hardware products and firewalls to choose from.

Protect Sensitive Files

Receive peace of mind when you step away from your computer or take a lunch break with security tokens, which cloak and conceal files stored on a desktop computer or laptop until token authentication is confirmed. A security token is a small device that can be carried to authorize access to a specific network. Security tokens use a two-step token authentication process, first providing a user with a unique PIN number, which the device displays, and then identifying and registering that transmitted PIN number, allowing access to stored information. Whether you're trying to protect corporate records or personal data, a security token prevents unauthorized entry. If the security token falls into the wrong hands, an individual still won't be able to gain access to your network, since the PIN number will be needed as well.

Physical Types

Most security tokens are designed for quick and convenient transport and are usually embedded in a commonly used object, like a flash drive or key fob. A security token can connect to a computer wirelessly via technologies like Bluetooth® or directly via a USB port.

Choose 2 to 4 Items to Compare