iShield Key
The strongest and most flexible hardware authentication
Swissbit makes the digital world safer and more convenient by protecting users’ digital identities – on websites, in applications, across online services, and within company networks. It even secures physical access control.
90% of internet users are concerned about having their passwords compromised – and not without reason. Compromised credentials are the most common cause of malicious attacks, accounting for 61% of breaches. The Swissbit iShield Key series offers the strongest authentication, simultaneously simple, secure, and flexible. It actively protects users from online attacks, such as phishing, social engineering, and account takeover.
Swissbit iShield Key series complies with worldwide cybersecurity regulations including NIS-2 in the EU and the zero-trust strategy outlined by the OMB for US agencies. Learn more.
Key Features
- Works with FIDO2 and U2F compatible websites and services, such as Google, Microsoft, Salesforce, Amazon Web Services, etc.
- Supports FIDO2 and U2F standards
- Security: public and private key cryptography
- Additional Security for iShield Key Pro: HOTP (Event), TOTP (time-based), Smartcard (PIV-compatible), OpenSC-compatible
- Durable security key with fully molded, robust and water resistant housing
- Tap-and-go authentication with NFC for mobile devices
- Touch authentication for USB-A interface
- Operating Systems: Windows 10/11, macOS, iOS, iPadOS, Linux, Chrome OS, Android
- Browsers: Firefox, MS Edge, Google Chrome, Apple Safari
Key Features iShield Key Pro
- PIV (Personal Identity Verification) functionality utilizes Public Key Infrastructure (PKI) and PKCS #11 standards for secure digital certificate and private key storage. It supports authentication, digital signatures, encryption, and physical access, enabling Windows logon via local accounts or Microsoft Active Directory, even with BitLocker encryption.
- HOTP provides an event-based two-factor authentication method, suitable for web services without WebAuthn support. It combines a shared secret key with a counter-based one-time password, ensuring security for both online and offline applications without the need for internet connectivity.
- TOTP (Time-Based One-Time Password) provides a time-based two-factor authentication method, ideal for web services without WebAuthn support that require an additional layer of security. It generates a unique, temporary password by combining a shared secret key with the current time. The iShield Key supports up to 42 TOTP slots. Use our Android TOTP App to generate temporary passwords with an NFC-enabled Android phone and your iShield Key Pro.
Series Name |
iShield Key Pro | iShield Key FIDO2 |
Supported Standards / Features |
|
|
Mechanical Details |
|
|
Form Factor / Device Type |
|
|
Certifications |
|
|
Operating Temperature Range |
Extended: -25 °C to 70 °C
|
|
Platforms Supported |
|
Your benefits
The iShield Key Experience
Your keys for leading digital service providers
Target Groups
iShield Key Features
iShield Key Manager
White Paper
Availability
iShield Key is available now from the following partners and web shops. Please feel free to address individual inquiries in advance to sales@swissbit.com. We are looking forward to your request!