Endpoints are network-connected computing devices, capable of communicating with other points and devices across the network. Such devices come in many forms, from PCs, tablets and mobile phones, to smart vehicles and light bulbs. While these devices form endpoints on a network they are often the starting point of a cyberattack, which is why a focus on endpoint security is essential. This is especially relevant in a corporate environment, where sensitive business data is at stake.
Endpoint security or protection solutions include antivirus software, endpoint detection and response (EDR) software and services, and multi-factor authentication among others. The global endpoint security market is projected to reach 8.28 billion U.S. dollars in 2020 and it makes up for around 13 percent of the overall IT security market.
As companies rely more heavily on internet-enabled devices to carry out their daily business activities, it is of great importance that such devices are sheltered from cyber threats. Endpoint devices are protected to different degrees in companies. Network devices such as servers and routers are generally the best covered by security solutions; computing devices such as desktops and laptops are also relatively well protected. Only half of all cloud-based endpoints are currently protected. However, this is a known concern and coverage levels are expected to increase in the near future. IoT devices such as smart sensors and smart cars are the least protected endpoints, likely due to their recent adoption and still relatively peripheral roles. However, the number of IoT connected devices is expected to grow at a great speed and the cybersecurity of such devices should deserve more attention to ensure the safety of the entire enterprise device network.
Businesses are well aware of the importance of keeping their endpoints safe from cyberattacks. As mentioned earlier, most essential endpoint devices are already covered by security solutions. Furthermore, about a third of surveyed North American and European IT decision-makers reported the use of endpoint protection as a service solutions in their organizations, and more reported plans for implementing these in the next two years. Next-generation endpoint security technologies such as vulnerability assessment or mapping, encryption, as well as centralized dashboards are also being widely deployed in global organizations to ensure the safety of their devices, not to mention the use of artificial intelligence for cybersecurity.
This text provides general information. Statista assumes no
liability for the information given being complete or correct.
Due to varying update cycles, statistics can display more up-to-date
data than referenced in the text.
In the following 6 chapters, you will quickly find the 44 most important statistics relating to "Endpoint security".