The statistic shows the types of information technology security analysis processes used by organizations worldwide to analyze compromised systems according to a 2016 survey conducted by Cisco Systems. As of 2016, 43 percent of respondents indicated that their organization used registry analysis to analyze compromised systems.
Which of these processes does your organization use to analyze compromised systems?
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
Cisco Systems. (January 31, 2017). Which of these processes does your organization use to analyze compromised systems? [Graph]. In Statista. Retrieved February 14, 2025, from https://www.statista.com/statistics/504110/worldwide-it-security-process-for-analyzing-systems/?__sso_cookie_checker=failed
Cisco Systems. "Which of these processes does your organization use to analyze compromised systems?." Chart. January 31, 2017. Statista. Accessed February 14, 2025. https://www.statista.com/statistics/504110/worldwide-it-security-process-for-analyzing-systems/?__sso_cookie_checker=failed
Cisco Systems. (2017). Which of these processes does your organization use to analyze compromised systems?. Statista. Statista Inc.. Accessed: February 14, 2025. https://www.statista.com/statistics/504110/worldwide-it-security-process-for-analyzing-systems/?__sso_cookie_checker=failed
Cisco Systems. "Which of These Processes Does Your Organization Use to Analyze Compromised Systems?." Statista, Statista Inc., 31 Jan 2017, https://www.statista.com/statistics/504110/worldwide-it-security-process-for-analyzing-systems/?__sso_cookie_checker=failed
Cisco Systems, Which of these processes does your organization use to analyze compromised systems? Statista, https://www.statista.com/statistics/504110/worldwide-it-security-process-for-analyzing-systems/?__sso_cookie_checker=failed (last visited February 14, 2025)
Which of these processes does your organization use to analyze compromised systems? [Graph], Cisco Systems, January 31, 2017. [Online]. Available: https://www.statista.com/statistics/504110/worldwide-it-security-process-for-analyzing-systems/?__sso_cookie_checker=failed