Yubico YubiKey Logo

Yubico YubiKey pros and cons

Vendor: Yubico
4.4 out of 5
Badge Leader
465 followers
Post review
 

Yubico YubiKey Pros review quotes

PB
May 23, 2023
It's small and lightweight. Like a phone, it doesn't run out of battery. It also doesn't have to be unlocked. It doesn't break. Moreover, they're very durable and it's very convenient.
OmerKhan1 - PeerSpot reviewer
Jun 27, 2023
The solution is simple to use and we have installed it in our clients' endpoints. The tool is just plug-and-play for the end user. The end user can just put in the key to the security computer and log in without any hassle. The solution is efficient, user-friendly, and easy to use.
AM
Sep 29, 2022
The most valuable feature of Yubico YubiKey is security.
Find out what your peers are saying about Yubico, RSA, Cisco and others in Authentication Systems. Updated: April 2024.
768,578 professionals have used our research since 2012.
RC
May 26, 2023
YubiKey is a hardware security device with advanced security features.
 

Yubico YubiKey Cons review quotes

PB
May 23, 2023
Currently, an area where the product lacks is in addressing service needs.
OmerKhan1 - PeerSpot reviewer
Jun 27, 2023
It would be better if the product can come up with a serial number for the keys. It would be nice if they had a numbering system as a configuration identity that would help the IT and technical teams to identify the keys because they look all the same. It would be more like putting a tag on them.
AM
Sep 29, 2022
Yubico YubiKey is inconvient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords. It may be very good for security but it is not great for people to use.
Find out what your peers are saying about Yubico, RSA, Cisco and others in Authentication Systems. Updated: April 2024.
768,578 professionals have used our research since 2012.
RC
May 26, 2023
It's a hardware device, so it isn't cost-effective to use for all your accounts. You might have a hard time getting budget approval. It's better to take a strategic approach and use it only for critical accounts. You can use other forms of authentication for the rest.