iShield Key

Protecting Online Accounts with Strongest and Most Flexible Hardware Authentication

Swissbit helps to make the digital world safer and more convenient allowing users to protect online accounts by securely accessing websites, applications, online services, and company networks. Swissbit iShield Key offers strongest authentication, that is simple, secure and flexible, and that protects users against online attacks, such as phishing, social engineering and account takeover.

iShield is the Swissbit product family brand for plug-and-play security products. Learn more.


Key Features

  • Works with FIDO2 and U2F compatible websites and services, such as Google, Microsoft, Salesforce, Amazon Web Services, etc.
  • Supports FIDO2 and U2F standards
  • Security: public and private key cryptography
  • Additional Security for iShield Key Pro: HOTP (Event), TOTP (time-based), Smartcard (PIV-compatible), OpenSC-compatible
  • Durable security key with fully molded, robust and water resistant housing
  • Tap-and-go authentication with NFC for mobile devices
  • Touch authentication for USB-A interface
  • Operating Systems: Windows 10/11, macOS, iOS, Linux, Chrome OS, Android
  • Browsers: Firefox, MS Edge, Google Chrome, Apple Safari

 

 

 

 

Key Features iShield Key Pro

  • PIV (Personal Identity Verification) functionality utilizes Public Key Infrastructure (PKI) and PKCS #11 standards for secure digital certificate and private key storage. It supports authentication, digital signatures, encryption, and physical access, enabling Windows logon via local accounts or Microsoft Active Directory, even with BitLocker encryption.
  • HOTP provides an event-based two-factor authentication method, suitable for web services without WebAuthn support. It combines a shared secret key with a counter-based one-time password, ensuring security for both online and offline applications without the need for internet connectivity.
  • TOTP (Time-Based One-Time Password) provides a time-based two-factor authentication method, ideal for web services without WebAuthn support that require an additional layer of security. It generates a unique, temporary password by combining a shared secret key with the current time. The iShield Key supports up to 42 TOTP slots. Use our Android TOTP App to generate temporary passwords with an NFC-enabled Android phone and your iShield Key Pro.

 

Series Name

iShield Key Pro iShield Key FIDO2

Supported Standards / Features

  • WebAuthn
  • FIDO2/CTAP2
  • Universal 2nd Factor (U2F) CTAP1
  • HOTP (Event)
  • Smartcard (PIV-compatible)
  • OpenSC-compatible
  • WebAuthn
  • FIDO2/CTAP2
  • Universal 2nd Factor (U2F) CTAP1

Mechanical Details

  • 51.5 x 18.5 x 6mm
  • Blue thermoplastic polyamide (PA) with matte finish
  • Rear Touch sensor, keychain hole
    Water resistant, robust construction
Form Factor / Device Type
  • CCID Smartcard, FIDO2 HID Device
  • USB-A without shroud
  • With NFC interface and multi-color LED

Certifications

  • FIDO Universal 2nd Factor (U2F/CTAP1)
  • FIDO2 Level 1

Operating Temperature Range

Extended: -25 °C to 70 °C

 

Platforms Supported
  • Operating Systems: Windows 10/11, macOS, iOS, Linux, Chrome OS, Android
  • Browsers: Firefox, MS Edge, Chrome, Apple Safari

Target Groups


Enterprise IT


Simple and fast deployment across entire enterprise.


Businesses

Easy integration into own system and application to allow users to protect access to accounts offering various security options.

Key benefits

Simple

Works with any FIDO2 compatible websites and services

All-in-one security key with NFC and USB connectivity

Secure

Supports zero trust strategy

Phishing-resistant

Additional security features (e.g., TOTP, HOTP, PIV, BitLocker)

Flexible

Supports passwordless, two-factor (2FA) or multi-factor authentication (MFA)

Standard FIDO-solution & On-premise solution

Storage of up to 32 passkeys

iShield Key Manager

White Paper

In the face of rising cyber threats, the concept of "zero trust" has emerged as a viable alternative to conventional security approaches. This white paper explores zero trust principles and implementation strategies, demonstrating how companies can effectively safeguard critical resources and data against internal and external threats.

Particular focus is placed on the integration of zero trust solutions with hardware authentication, such as FIDO security keys. The objective is to clarify that zero trust is not a complex concept but rather a set of defined principles and best practices that enhance security and minimize risks.

Download Now

Availability

iShield Key is available now from the following partners and web shops. Please feel free to address individual inquiries in advance to sales@swissbit.com. We are looking forward to your request!

 

Distribution Partners

Worldwide Webshop Partners

Swissbit Product Introduction:
iShield Key FIDO2

How to manage your iShield FIDO2
Security Key

How to Register & Sign in to Online Accounts with iShield FIDO