Table of Contents
PART 01: Executive summary
PART 02: Scope of the report
PART 03: Research Methodology
PART 04: Introduction
- Key market highlights
- 2FA
- Comparison between 2FA and MFA
- Advantages of 2FA
- Regulations related to MFA
- Types of authentication keys
PART 05: Economic overview
PART 06: Market landscape
- Market overview
- Market assumptions
- Market size and forecast
PART 07: Market segmentation by end-user
- Global 2FA market by end-user
- PART 08: Geographical segmentation
- Global 2FA market by geography
- Global 2FA market by geography (revenue)
PART 09: Buying criteria
PART 10: Market drivers
- Increase in volume of online transactions
- High level of security provided by hardware OTP tokens
- Adherence to compliance mandates
- Impact of drivers
PART 11: Market Challenges
- Inconvenience of carrying hardware tokens and vulnerability to threats
- Lack of telecom infrastructure in developing countries
- Rise in number of technical defects
PART 12: Impact of drivers and challenges
PART 13: Market trends
- Introduction of OOB authentication
- Emergence of cloud-based 2FA
- Growing adoption of unified platforms for authentication purposes
PART 14: Five forces analysis
- Five forces analysis
PART 15: Vendor landscape
- Competitive scenario
- Top-vendor offerings
- Vendor matrix
- Vendor rating
- Vendor highlights
- M&A
- Description of major vendors
- Other prominent vendors
PART 16: Appendix
- List of abbreviations
PART 17: Explore Technavio

List of Exhibits
Exhibit 01:FA versus MFA
Exhibit 02: Regulations and their depictions
Exhibit 03: Market assumptions
Exhibit 04: Global 2FA market 2016-2021 ($ billions)
Exhibit 05: Global 2FA market by end-user 2016-2021
Exhibit 06: Global 2FA market by end-user 2016-2021 ($ billions)
Exhibit 07: Global 2FA market by geography 2016-2021
Exhibit 08: Global 2FA market by geography 2016-2021 ($ billions)
Exhibit 09: Buying criteria for 2FA
Exhibit 10: Impact of drivers
Exhibit 11: Impact of drivers and challenges
Exhibit 12: Five forces analysis
Exhibit 13: Product offerings
Exhibit 14: Vendor matrix
Exhibit 15: Vendor rating
Exhibit 16: Vendor highlights
Exhibit 17: M&A of vendors
Exhibit 18: Other prominent vendors


Companies Mentioned
Entrust, Gemalto, RSA Security, SecurEnvoy, VASCO Data Security International, Authenex, Authentify, Authy, Deepnet Security, DynaPass, Fortinet, HID Global, ID Control, Meontrust, Mi-Token, PointSharp, Protectimus Solutions, SecureAuth, SecurEnvoy, SecurStar, Yubico.