The most used security method to grant access to company infrastructure since 2021 was by password. At the same time, 60 percent of respondents stated that their organization used hardware security tokes for infrastructure access.
What security methods do you currently use to grant access to infrastructure?
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
Teleport. (November 7, 2022). What security methods do you currently use to grant access to infrastructure? [Graph]. In Statista. Retrieved November 22, 2024, from https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. "What security methods do you currently use to grant access to infrastructure?." Chart. November 7, 2022. Statista. Accessed November 22, 2024. https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. (2022). What security methods do you currently use to grant access to infrastructure?. Statista. Statista Inc.. Accessed: November 22, 2024. https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. "What Security Methods Do You Currently Use to Grant Access to Infrastructure?." Statista, Statista Inc., 7 Nov 2022, https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport, What security methods do you currently use to grant access to infrastructure? Statista, https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/ (last visited November 22, 2024)
What security methods do you currently use to grant access to infrastructure? [Graph], Teleport, November 7, 2022. [Online]. Available: https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/