fitgap

Thales FIDO and FIDO2 Security Keys

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Thales FIDO and FIDO2 Security Keys and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial unavailable
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Energy and utilities
  2. Public sector and nonprofit organizations
  3. Banking and insurance

What is Thales FIDO and FIDO2 Security Keys

Thales FIDO and FIDO2 Security Keys are hardware authenticators that support FIDO standards (including FIDO2/WebAuthn) to enable phishing-resistant, passwordless sign-in and strong multi-factor authentication. They are used by enterprises and regulated organizations to secure workforce access to operating systems, VPNs, and web applications, and can also be used for consumer account protection where supported. The keys provide cryptographic authentication bound to the physical device and typically integrate with identity providers and access management stacks that support FIDO2. Deployment commonly involves issuing and managing physical keys, including enrollment, recovery, and replacement processes.

pros

Phishing-resistant authentication

FIDO2/WebAuthn authentication uses public-key cryptography and origin binding, which reduces exposure to credential phishing compared with OTP-based factors. Hardware keys can enforce user presence (touch) and can be used as a strong second factor or for passwordless flows where supported. This aligns well with security programs that require high-assurance authentication for privileged or remote access.

Standards-based interoperability

FIDO/FIDO2 is a widely adopted standard supported by modern browsers and many identity and access management platforms. This reduces reliance on proprietary authentication protocols and helps organizations use the same authenticator across multiple applications. It also supports a mix of passwordless and MFA deployments depending on application readiness.

Hardware-backed key protection

Private keys remain on the hardware authenticator rather than being stored on endpoints, which can reduce risk from malware and credential database compromise. Physical possession requirements add a tangible control for high-risk access scenarios. Hardware keys can also be used in environments where mobile push or SMS is not feasible or permitted.

cons

Physical logistics and lifecycle

Organizations must procure, distribute, and track physical keys, which adds operational overhead compared with purely software-based authenticators. Lost or damaged keys require replacement and a recovery process that can impact user productivity. Programs typically need policies for spare keys, break-glass access, and secure issuance.

User experience varies by device

Compatibility and user experience depend on connector type (e.g., USB-A/USB-C/NFC) and endpoint support, which can complicate mixed device fleets. Some use cases require additional drivers or configuration depending on operating system and application. Users may also resist carrying an extra device, especially for low-risk applications.

Not a full IAM platform

Security keys provide an authenticator but do not replace identity governance, directory services, or customer identity management capabilities. Organizations still need an identity provider/access layer that supports FIDO2 and handles policies, provisioning, and session management. Advanced risk signals and adaptive authentication typically come from surrounding IAM tooling rather than the key itself.

Seller details

Thales Group
Meudon, France
1893
Public
https://www.thalesgroup.com/
https://x.com/thalesgroup
https://www.linkedin.com/company/thales/

Tools by Thales Group

Imperva Advanced Bot Protection
Imperva App Protect
Imperva Secure CDN
Imperva API Security
Vormetric Data Security Platform
Imperva Cloud Data Protection
Imperva Cloud Data Security
Imperva Application Security Platform
Imperva Runtime Application Self-Protection (RASP)
Vormetric Transparent Encryption
Thales CipherTrust Transparent Encryption
Thales Data Protection on Demand
Thales Hardware Security Modules (HSMs)
Thales CipherTrust Cloud Key Manager
Thales CipherTrust Manager
Imperva Web Application Firewall (WAF)
Thales SafeNet Trusted Access
SafeNet Authentication Service Private Cloud Edition (SAS PCE)
Thales OneWelcome Identity Platform
Thales FIDO and FIDO2 Security Keys

Popular categories

All categories