RSA iShield Key 2
Solutions and Benefits
-
Phishing-resistant passwordless authentication: The RSA iShield Key 2 provides strong, phishing-resistant authentication, protecting systems from credential-based attacks
-
Compliance with global standards: The iShield is provisioned via a secure supply chain and meets the highest security standards, including FIPS 140-3 level 3 certification and FIDO2 certification, ensuring compliance with US Executive Order (EO) 14028, US Office of Management and Budget (OMB) M-22-09, M-22-14, NIS2, DORA, PCI DSS, and other global standards and cybersecurity best practices
-
Versatile and resilient: The solution supports FIDO2, OATH HOTP, PKI, and PIV smart cards, making it compatible with both legacy and modern systems
-
Zero Trust identity protection: Integrates with the RSA® ID Plus platform to advance Zero Trust architecture, providing robust security compliance by default
-
Future-proof security: The RSA iShield Key 2 is field-upgradable, allowing firmware updates to apply new features and bug fixes without replacing the device
-
Ruggedized design: The device features a fully molded, robust, and waterproof housing, ensuring durability in various environments
-
Flexible usage: Available via both USB and contactless NFC, providing multiple methods of secure access. The RSA iShield Key 2 Integrates both digital and physical access, with support for MIFARE
-
Perfect for robust use: The RSA iShield Key 2 is ideal for clean rooms or air-gapped and production environments and can be used in areas where smartphones and other electronic devices are not permitted. The device can be used with users wearing latex gloves
RSA iShield Key 2
Specifications
MIFARE DESFire EV3, FIDO2/CTAP2.1, WebAuthn, Universal 2nd Factor (U2F) CTAP1, HOTP (Event), Smartcard (PIV-compatible), OpenSC-compatible
51.5mm x 18.5mm x 6mm
FIDO2 HID Device, CCID Smartcard, USB-A or USB-C, With NFC interface and multi-color LED
FIDO Universal 2nd Factor (U2F/CTAP1), FIDO2 Level 1
Extended: -25°C to 70°C
Operating Systems: Windows 10/11, macOS, iOS, iPadOS, Linux, Chrome OS, Android
Browsers: Firefox, MS Edge, Chrome, Apple Safari
Holds up to 300 FIDO passkeys and 24 smart card certificates
MIFARE DESFire EV3, FIDO2/CTAP2.1, WebAuthn, Universal 2nd Factor (U2F) CTAP1, HOTP (Event), Smartcard (PIV-compatible), OpenSC-compatible
51.5mm x 18.5mm x 6mm
FIDO2 HID Device, CCID Smartcard, USB-A or USB-C, With NFC interface and multi-color LED
FIDO Universal 2nd Factor (U2F/CTAP1), FIDO2 Level 1
Extended: -25°C to 70°C
Operating Systems: Windows 10/11, macOS, iOS, iPadOS, Linux, Chrome OS, Android
Browsers: Firefox, MS Edge, Chrome, Apple Safari
Holds up to 300 FIDO passkeys and 24 smart card certificates
RSA iShield Key 2 versus other hardware authenticators
(FIPS 140-2 only)
(FIPS 140-2 only)
200-300 passkeys
24 smart card certs
25 passkeys
24 smart card certs
80KB memory
-25C to +70C
0C to +40C
0C to +60C
(FIPS 140-2 only)
(FIPS 140-2 only)
200-300 passkeys
24 smart card certs
25 passkeys
24 smart card certs
80KB memory
-25C to +70C
0C to +40C
0C to +60C
Learn more about the RSA iShield Key 2
Move beyond phishing resistance
The Beyond Phishing Resistance: The RSA iShield Key 2 report details how the hardware authentication solution can help organizations deploy passwordless throughout their organization, evolve their Zero Trust security stance, and meet global regulations. Download the report now to learn:
- How the RSA iShield accelerates passwordless by accounting for the challenging and high-risk use cases that typical authenticators can’t cover
- The global anti-phishing and multi-factor authentication (MFA) regulations that the RSA iShield meets
- How the RSA iShield can help organizations reach “Optimal” Zero Trust maturity as defined by the Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Maturity Model
Watch on-demand: Phishing Resistance in Action – Hardware and Software Passwordless Solutions
Watch the on-demand webinar with RSA VP of Product Management and UX Dave Taku, RSA Client Director Colin Holowach, RSA Product Marketer Ali Adib, and Swissbit Partner Enablement Manager Chris Collier on how organizations can deploy phishing-resistant passwordless authentication for every user, and the unique use cases and user groups that the RSA iShield Key 2 addresses.
What you’ll learn:
- How completely removing passwords neutralizes phishing threats
- How frictionless, always-on secure access enhances productivity and security simultaneously
- How to provide complete passwordless coverage for critical scenarios and privileged users
RSA iShield Key 2 users and sectors
Move beyond phishing resistance
Personnel working in highly-regulated industries—including financial services healthcare and pharmaceuticals, government agencies, defense contractors, and other critical infrastructure sectors—should learn more about how the RSA iShield helps them meet global regulations while also accelerating passwordless authentication.
Employees with the following job titles should consider downloading it for further information:
- Chief Information Security Officers (CISOs)
- Director of Information Security
- Head of Identity and Access Management (IAM)
- Enterprise Security Architect
- IT Director / Head of Infrastructure
- Identity Architect
- Systems Engineer
- Chief Risk Officer
- VP of Governance, Risk, and Compliance
- Head of IT Audit
What Our Clients Have to Say
“Mandatory authentication software for all firms”
“Most efficient way for secure login to VPN”
“Great Security Tool to keep Data Secure”