This free survey is powered by
QUESTIONPRO.COM
Create a Survey
Surveys
2009
July
M
Marketing09
Marketing09
0%
Hi, my name is Jessica, and I’m calling to see if you would be willing to participate in a brief five-minute survey to capture your thoughts on IT security. The survey is for market research only. The results will be aggregated and provided to our client’s marketing team only. The results will not be used for sales purposes. Do you have a couple of minutes to answer a few short questions?
If yes: Great, I appreciate your time, let’s get started. (Move to Question 1)
If no: Thanks anyway for your time, have a good day. (Disconnect)
I’m going to read you some statements. After I’ve read all of the statements, I’ll ask you to rate each of them on a scale of 1 to 5, with 5 being really compelling and 1 being not at all compelling.
1 - Not At All Compelling
2
3
4
5 - Very Compelling
Two-Factor for Rapid, Cost Effective Compliance
Tokenless Two-Factor Authentication
Because Passwords Just Aren’t Enough
Better Than Tokens In Every Way
Simple, Secure Authentication
Prevent Unauthorized Access
High Security, Low Cost Authentication
If not a CUSTOMER: Have you heard of PhoneFactor?
Yes
No
Maybe
NA (Customer)
If not a CUSTOMER: What do you think PhoneFactor does?
Correct
Partly Correct (Read Explanation)
Not Correct or Didn't Kow (Read Explanation)
NA - Customer
PhoneFactor Explanation:
PhoneFactor adds a second layer of authentication – an automated phone call to any corporate or website login. The user simply logs in with their username and password as they normally would. Instantly, their phone rings; they answer and press # or a PIN to complete the login. A hacker would need to know the user’s password (the first factor) and have possession of their phone (the second factor) in order to login.
How and when did you first hear about PhoneFactor?
If you were searching for additional identity and access security solutions which search terms would you use?
I am going to read a number of search terms. For each term, please indicate on a scale of 1 to 5 how likely you would be to use that search term. 1 is Not At All Likely and 5 is Very Likely.
1 - Not At All Likely
2
3
4
5 - Very Likely
security tokens
user authentication
strong authentication
two-factor
multi-factor
password security
phone authentication
Rank the following statements in order of which you find most compelling.
Because Passwords Just Aren’t Enough
-- Select --
1
2
3
4
5
6
7
High Security, Low Cost Authentication
-- Select --
1
2
3
4
5
6
7
Prevent Unauthorized Access
-- Select --
1
2
3
4
5
6
7
Two-Factor for Rapid, Cost Effective Compliance
-- Select --
1
2
3
4
5
6
7
Better Than Tokens In Every Way
-- Select --
1
2
3
4
5
6
7
Tokenless Two-Factor Authentication
-- Select --
1
2
3
4
5
6
7
Simple, Secure Authentication
-- Select --
1
2
3
4
5
6
7
If you were purchasing two-factor authentication services, would you consider PhoneFactor?
Yes
No
Maybe
Why or why not?
Please contact
[email protected]
if you have any questions regarding this survey.
Loading...
close
Loading...
Close
staticapp1.questionpro.net