SafeKey Comparison
Discover all features and technical details of the different SafeKeys and select the one which suits your needs best.
SafeKey One vs. SafeKey Pro
Individual Use Cases | SafeKey One | SafeKey Pro | SafeKey Mobile |
---|---|---|---|
Two-Factor Authentication (2FA) | |||
Phishing protection | |||
Online identity protection | |||
Secure logins to social media | |||
Passwordless logins | |||
Encrypted backups of secret data | |||
Digital inheritance plans |
Crypto Use Cases | SafeKey One | SafeKey Pro | SafeKey Mobile |
---|---|---|---|
Secure logins to crypto exchanges | |||
Encrypted backups of private keys | |||
Crypto inheritance plans | |||
Decentralized data backups | |||
Self-custody protection | |||
Web3 asset protection |
Professional Use Cases | SafeKey One | SafeKey Pro | SafeKey Mobile |
---|---|---|---|
Passwordless workspaces | |||
Keep sensitive data safe | |||
Secure employee user accounts | |||
Store encrypted data shares | |||
Protect employees against phishing attacks | |||
Manage privileged accessibility | |||
Protect your workspace |
Supported | SafeKey One | SafeKey Pro | SafeKey Mobile |
---|---|---|---|
SSDP (Secure Share Distribution Protocol) | |||
FIDO2 | |||
FIDO U2F | |||
Browsers: Mozilla Firefox, Google Chrome, Safari, Microsoft Edge, Chromium, Opera | N/A | ||
Operating systems: Windows, macOS, Linux | N/A | ||
WebAuthentication (WebAuthn) | N/A | ||
With touch button | N/A | ||
USB 1.1, Type A | N/A |
Last updated