
Alexandra Borgeaud
Research expert covering cybersecurity and tech in Latin America
Get in touch with us nowAccording to a 2024 survey, the most popular protocol put in place by Chief Information Security Officers (CISOs) worldwide to combat organizational data loss was educating employees on data security best practices, as highlighted by
Log in or register to access precise data.
Log in or register to access precise data.
Log in or register to access precise data.
* For commercial use only
Basic Account
Starter Account
The statistic on this page is a Premium Statistic and is included in this account.
Professional Account
1 All prices do not include sales tax. The account requires an annual contract and will renew after one year to the regular list price.
Everything on "Endpoint security" in one document: edited and divided into chapters, including detailed references.
I think of Statista as Google for researchers. Statista provides you with the information you search for right away.![]()
Dr. Horst Stipp
EVP, Research & Innovation, Advertising Research Foundation
Overview
Endpoint devices
Cyberattacks
Companies
Technologies
* For commercial use only
Basic Account
Starter Account
The statistic on this page is a Premium Statistic and is included in this account.
Professional Account
1 All prices do not include sales tax. The account requires an annual contract and will renew after one year to the regular list price.