target audience: TECH BUYER Publication date: Mar 2021 - Document type: IDC PlanScape - Doc Document number: # US47485220
IDC PlanScape: IT Security — Using Multifactor Authentication
Content
List of Tables
List of Figures
Related Links
Table of Contents
-
IDC PlanScape Figure
-
Figure: IDC PlanScape: Executive Summary of IT Security for Using Multifactor Authentication
-
-
Executive Summary
-
Why Is Using Multifactor Authentication Important?
-
What's Wrong with Passwords?
-
Multifactor Authentication Builds Upon Passwords
-
Regulation Often Drives Adoption
-
User Attitudes Toward Multifactor Are Changing
-
-
What Is Using Multifactor Authentication?
-
What Isn't Multifactor?
-
Smartphones Play a Critical Role in Multifactor Authentication
-
Figure: Smartphone-Based Passcode Authentication
-
Figure: Smartphone-Based Push Authentication
-
-
Who Are the Key Stakeholders?
-
Table: Key Stakeholders
-
-
How Can My Organization Take Advantage of Using Multifactor Authentication?
-
Begin with a Pilot Rollout
-
Add Users in Waves
-
Add Services on a Parallel Track
-
Figure: Prioritizing Services for Multifactor Deployment
-
Communicate Frequently
-
-
Advice for Technology Leaders
-
Figure: Essential Guidance
-
-
Related Research