The most used security method to grant access to company infrastructure since 2021 was by password. At the same time, 60 percent of respondents stated that their organization used hardware security tokes for infrastructure access.
What security methods do you currently use to grant access to infrastructure?
Basic Account
Get to know the platform
You only have access to basic statistics.
This statistic is not included in your account.
Starter Account
The ideal entry-level account for individual users
- Instant access to 1m statistics
- Download in XLS, PDF & PNG format
- Detailed references
$69 USD $49 USD / Month *
in the first 12 months
Professional Account
Full access
Business Solutions including all features.
* Prices do not include sales tax.
Statistics on Passwordless security
Overview
5
- Premium Statistic Global IT security spending in identity access management 2017-2023
- Basic Statistic Passwordless authentication global market size 2020-2030
- Premium Statistic Global MFA market size 2016-2027
- Premium Statistic Global biometric authentication and identification market 2020-2026, by end user
- Premium Statistic Global password management market revenue 2020-2030
Adoption
6
- Premium Statistic Global passwordless adoption 2020-2022
- Premium Statistic Passwordless access implementation worldwide 2022, by region
- Premium Statistic Implementation passwordless access worldwide 2022, by industry and deployment status
- Premium Statistic Corporate passwordless deployment worldwide 2022, by stage
- Premium Statistic Likelihood of adopting passwordless authentication by organizations 2022, by country
- Premium Statistic Passwordless authentication methods adopted by organizations 2022, by country
Multi-factor authentication (MFA)
6
- Premium Statistic Global number of multi-factor authentications (MFA) 2020-2021Â
- Premium Statistic Deployment level of MFA system by organizations worldwide 2022, by region
- Premium Statistic Main obstacles to MFA adoption worldwide 2022
- Premium Statistic Security awareness training programs on MFA 2021, by country
- Premium Statistic Number of Microsoft Authenticator app downloads worldwide 2020-2022, by month
- Premium Statistic Number of Google Authenticator app downloads worldwide 2020-2022, by month
Single sign-on (SSO)
4
- Premium Statistic Deployment level of SSO system worldwide 2022, by region
- Premium Statistic Company strategy for converting SSO with MFA 2021
- Premium Statistic Extended use of SSO and/or MFA by organizations worldwide 2022
- Premium Statistic Security authentication measures taken to protect online accounts 2022, by country
Fast IDentity Online (FIDO)
3
Consumption
6
- Premium Statistic Corporate passwordless methods worldwide 2022, by type
- Premium Statistic Passwordless infrastructure importance for security improvement worldwide 2022
- Premium Statistic Reasons to deploy passwordless authentication methods globally 2022
- Premium Statistic Primary user base for passwordless authentication worldwide 2022
- Premium Statistic Reasons why global companies did not deploy passwordless 2022
- Premium Statistic Share of accounts denying authentication from specific countries 2022
Special focus: Authentication technologies
5
- Premium Statistic Global emerging IT security technologies and architectures 2023, by deployment status
- Premium Statistic Authentication technologies deployed and used by companies worldwide 2022
- Premium Statistic Cyber security technologies in use and planned for upgrade worldwide 2022
- Premium Statistic Main security factors used by organizations worldwide 2021-2022
- Premium Statistic Global security methods used to grant access to infrastructure 2021-2022
Further related statistics
21
- Cyber security venture capital funding worldwide 2017-2022
- Number of global cyber security venture capital funding deals 2017-2022
- Estimated revenue of the cyber security sector in the UK 2017-2022
- Global emerging IT security technologies and architectures 2023, by deployment status
- Main priorities for companies' IT security departments worldwide 2023
- Cyber security market revenue worldwide 2019-2030
- Share of IT spend on cyber security in the U.S and Europe 2020-2022, by country
- Average annual increase in global companies' IT security budgets 2018-2023
- Share of companies with a shortfall of skilled IT security staff worldwide 2018-2023
- Cyber security venture capital funding worldwide 2021-2023, by quarter
- Number of global cyber security VC funding deals closed 2021-2023, by quarter
- Global companies with a shortfall of skilled IT security staff 2023, by industry
- Number and value of investment deals in cyber security worldwide 2018-2022
- Number of cyber security investments in the U.S. 2022, by state
- Cyber security: IT components needing improvement worldwide 2022
- Global companies' cyber security accomplishments achieved in 2022
- Perception of zero trust in relation to cyber security in the U.S. 2022
- Global IT security skills shortage 2023, by job
- Main concerns regarding cyber security in U.S. tech companies 2022
- Cyber security market value in Latin America H1 2022, by country
- Employer-led cyber security education worldwide 2021
Further Content: You might find this interesting as well
Teleport. (November 7, 2022). What security methods do you currently use to grant access to infrastructure? [Graph]. In Statista. Retrieved May 30, 2023, from https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. "What security methods do you currently use to grant access to infrastructure?." Chart. November 7, 2022. Statista. Accessed May 30, 2023. https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. (2022). What security methods do you currently use to grant access to infrastructure?. Statista. Statista Inc.. Accessed: May 30, 2023. https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport. "What Security Methods Do You Currently Use to Grant Access to Infrastructure?." Statista, Statista Inc., 7 Nov 2022, https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/
Teleport, What security methods do you currently use to grant access to infrastructure? Statista, https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/ (last visited May 30, 2023)
What security methods do you currently use to grant access to infrastructure? [Graph], Teleport, November 7, 2022. [Online]. Available: https://www.statista.com/statistics/1293051/security-methods-infrastructure-access/