The most used security method to grant access to company infrastructure since 2021 was by password. At the same time, 60 percent of respondents stated that their organization used hardware security tokes for infrastructure access.
What security methods do you currently use to grant access to infrastructure?
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
Teleport. (November 7, 2022). What security methods do you currently use to grant access to infrastructure? [Graph]. In Statista. Retrieved October 12, 2024, from https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. "What security methods do you currently use to grant access to infrastructure?." Chart. November 7, 2022. Statista. Accessed October 12, 2024. https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. (2022). What security methods do you currently use to grant access to infrastructure?. Statista. Statista Inc.. Accessed: October 12, 2024. https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. "What Security Methods Do You Currently Use to Grant Access to Infrastructure?." Statista, Statista Inc., 7 Nov 2022, https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport, What security methods do you currently use to grant access to infrastructure? Statista, https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/ (last visited October 12, 2024)
What security methods do you currently use to grant access to infrastructure? [Graph], Teleport, November 7, 2022. [Online]. Available: https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/