• 0Shopping Cart
Avasant
  • NEW TO AVASANT?

    Sign Up
  • Management Consulting
    • Strategic Sourcing
    • Digital
    • IT & Business Transformation
    • Software Selection
    • Governance, Risk & Compliance
    • Global Development
    • Avasant Law
  • Industries
    • Aerospace & Defense
    • Banking, Financial Services & Insurance
    • Energy & Resources
    • Healthcare & Life Sciences
    • High Tech & Telecommunications
    • Media & Entertainment
    • Private Equity
    • Public Sector
    • Retail & Manufacturing
    • Social Impact Institutions
    • Travel & Transportation
  • Research & Data
    • Access Reports
    • RadarView™ – Market Assessments
    • Computer Economics™ – IT Metrics
    • Global Equations™ – Country Data and Index
    • Avasant Beyond
    • Coronavirus Resource Center
    • Avasant Labs
    • AvaMark™
    • AvaSense™
    • Strativa®
  • Benchmarking
    • IT Spending Benchmark
    • TCO and Spend Transparency Analysis
    • Staffing and Salary Benchmark
    • IT Infrastructure Services Benchmark
    • Digital and Application Services Benchmark
    • BPO Services Benchmark
    • Cloud Enterprise Agreements Benchmark
    • IT Software License Benchmark
  • Events
    • Event Calendar
    • Empowering Beyond Events
    • Empowering Beyond Summit 2020
    • Partner With Avasant Events
  • Why Us
    • Vision and Values
    • Industry Recognition
    • Avasant Global Team
    • Avasant Fellows
    • Corporate Social Responsibility
    • Press Releases and Media
    • Avasant Foundation
  • Contact
  • Column 1
    • What We Do
      • Strategic Sourcing
      • Digital
      • IT & Business Transformation
      • Software Selection
      • Governance, Risk & Compliance
      • Global Development
      • Benchmarking
      • Avasant Law
    • Avasant Research & Data
      • Access Reports
      • RadarView™ – Market Assessments
      • Computer Economics™ – IT Metrics
      • Global Equations™ – Country Data and Index
      • Videos
      • Avasant Beyond
      • Coronavirus Resource Center
  • Column 2
    • Who We Serve
      • Aerospace & Defense
      • Banking, Financial Services & Insurance
      • Energy & Resources
      • Healthcare & Life Sciences
      • High Tech & Telecommunications
      • Media & Entertainment
      • Private Equity
      • Public Sector
      • Retail & Manufacturing
      • Social Impact Institutions
      • Travel & Transportation
    • Powered by Avasant Labs
      • AvaMark™
      • AvaSense™
      • Strativa®
  • Column 3
    • Why Us
      • Corporate Overview
      • Vision and Values
      • Industry Recognition
      • Avasant Global Team
      • Avasant Fellows
      • Corporate Social Responsibility
      • Press Releases and Media
      • Avasant Foundation
  • Column 4
    • Contact
      • Submit RFP
      • Regional Contacts
      • Careers
    • Event Calendar
      • Empowering Beyond Events
      • Empowering Beyond Summit 2020
  • LinkedIn
  • Twitter
  • Youtube
  • Facebook
Login
Login to get free content each month and build your personal library at Avasant.com

Forgot your password?
Reset Password
Enter email address to reset your password.

Back to Login
New to Avasant?
Click on the button below to Sign Up

Sign Up

Contact Us

  • Home
  • Access Reports
  • RadarView™
    Market Assessments
  • Computer Economics™
    IT Metrics
  • Strativa®
    Analytics
  • Global Equations™
    Location Intelligence
  • Avasant Distinguished Fellows
  • Request a Consultation
  • My Account
Back
Fig3TwoFactorAdoptionAndBestPractices 600x400 - Two-Factor Authentication Adoption and Best Practices 2020

Two-Factor Authentication Adoption and Best Practices 2020

February, 2020

$295.00

Two-factor authentication is an IT security best practice that provides an extra layer of protection for system access. It is a highly advisable security measure, but our annual survey of IT management best practices shows that not enough companies use it formally and consistently. This report begins with a brief explanation of two-factor authentication. We next study two-factor authentication adoption and practice levels, examining those by organization size and sector. We conclude with best-practice recommendations. (16 pp., 6 fig.)

[Research Byte]

Related Reports

  • african african american bangkok black blue bridge 1443455 pxhere.com  600x400 - The Sharing Economy: Experiences over Ownership

    The Sharing Economy: Experiences over Ownership

  • Blockchain 3 Key Industries Infographic 600x400 - How North America, Europe and parts of Asia are shaping their blockchain regulatory environments

    How North America, Europe and parts of Asia are shaping their blockchain regulatory environments

  • MoneyShot DigitalMasters2019 600x400 - Avasant’s Digital Masters RadarView™ - Recognizes Leading Service Providers with the Most Comprehensive Digital Transformation Offerings

    Avasant’s Digital Masters RadarView™ – Recognizes Leading Service Providers with the Most Comprehensive Digital Transformation Offerings

  • search 2951638 1920 600x400 - Intelligent Automation: The Catalyst for Business Transformation in Shared Services

    Intelligent Automation: The Catalyst for Business Transformation in Shared Services

DISCLAIMER:

Avasant's research and other publications are based on information from the best available sources and Avasant's independent assessment and analysis at the time of publication. Avasant takes no responsibility and assumes no liability for any error/omission or the accuracy of information contained in its research publications. Avasant does not endorse any provider, product or service described in its RadarView™ publications or any other research publications that it makes available to its users, and does not advise users to select only those providers recognized in these publications. Avasant disclaims all warranties, expressed or implied, including any warranties of merchantability or fitness for a particular purpose. None of the graphics, descriptions, research, excerpts, samples or any other content provided in the report(s) or any of its research publications may be reprinted, reproduced, redistributed or used for any external commercial purpose without prior permission from Avasant, LLC. All rights are reserved by Avasant, LLC.

 

Avasant Companies

  • Avasant LLC
  • Avasant Law LLP
  • AvaSense Inc.
  • Avasant Beyond

Contact

  • Contact
  • Privacy Policy
  • Terms of Use
  • LinkedIn
  • Twitter
  • Youtube
  • Facebook
Footer Logo
© Copyright 2021 - Avasant and affiliated companies
Technology Trends 2020 Tech Trends Report 2020 80x80 - Two-Factor Authentication Adoption and Best Practices 2020 MoneyShotSD WAN2020 80x80 - Two-Factor Authentication Adoption and Best Practices 2020 SD-WAN Modernizing Complex Networks, Driving Business Agility
Scroll to top