Try our corporate solution for free!
(212) 419-8286
hadley.ward@statista.com

Information security - Statistics & Facts

Endpoints are network-connected computing devices, capable of communicating with other points and devices across the network. Such devices come in many forms, from PCs, tablets and mobile phones, to smart vehicles and light bulbs. While these devices form endpoints on a network they are often the starting point of a cyberattack, which is why a focus on endpoint security is essential. This is especially relevant in a corporate environment, where sensitive business data is at stake.

Endpoint security or protection solutions include antivirus software, endpoint detection and response (EDR) software and services, and multi-factor authentication among others. The global endpoint security market is projected to reach 8.28 billion U.S. dollars in 2020 and it makes up for around 13 percent of the overall IT security market.

Endpoint devices

As companies rely more heavily on internet-enabled devices to carry out their daily business activities, it is of great importance that such devices are sheltered from cyber threats. Endpoint devices are protected to different degrees in companies. Network devices such as servers and routers are generally the best covered by security solutions; computing devices such as desktops and laptops are also relatively well protected. Only half of all cloud-based endpoints are currently protected. However, this is a known concern and coverage levels are expected to increase in the near future. IoT devices such as smart sensors and smart cars are the least protected endpoints, likely due to their recent adoption and still relatively peripheral roles. However, the number of IoT connected devices is expected to grow at a great speed and the cybersecurity of such devices should deserve more attention to ensure the safety of the entire enterprise device network.

Cyber threats

Endpoint cyber threats are real. Around one-third of U.S. companies reported attacks on their endpoints in 2019. Although half of surveyed global organizations experienced fewer than 10 endpoint attacks in 2019, more than 15 percent respondents reported more than 100 such incidents in that year. Social engineering of end users such as phishing attacks as well as browser-based attacks driven by downloads to the endpoints are the most common endpoint attack vectors.

Adoption of endpoint security solutions

Businesses are well aware of the importance of keeping their endpoints safe from cyberattacks. As mentioned earlier, most essential endpoint devices are already covered by security solutions. Furthermore, about a third of surveyed North American and European IT decision-makers reported the use of endpoint protection as a service solutions in their organizations, and more reported plans for implementing these in the next two years. Next-generation endpoint security technologies such as vulnerability assessment or mapping, encryption, as well as centralized dashboards are also being widely deployed in global organizations to ensure the safety of their devices, not to mention the use of artificial intelligence for cybersecurity.

Endpoint security vendors

Symantec (a Broadcom division), MacAfee, and Trend Micro are the leading vendors in the corporate endpoint security software market. Symantec had a 12 percent market share in 2019, and the other two companies each had a 11 percent share of the market. Microsoft’s Windows Defender AV is also an endpoint security application commonly deployed in organizations, as Windows, the software giant’s market leading operating system, is overwhelmingly present in enterprise endpoint devices. The Microsoft BitLocker Device Encryption is also a widely used encryption tool to protect enterprise devices, sometimes in pairs with endpoint protection solutions.

Interesting statistics

In the following 6 chapters, you will quickly find the 44 most important statistics relating to "Endpoint security".

IT security

Dossier on the topic

All important statistics are prepared by our experts – available for direct download as PPT & PDF!
TOP SELLER

Important key figures

The most important key figures provide you with a compact summary of the topic of "Endpoint security" and take you straight to the corresponding statistics.

COVID impact on endpoint device use

Companies

Contact

Get in touch with us. We are happy to help.
Statista Locations
ContactHadley Ward
Hadley Ward
Sales Manager– Contact (United States)

Mon - Fri, 9am - 6pm (EST)

ContactZiyan Zhang
Ziyan Zhang
Customer Relations– Contact (Asia)

Mon - Fri, 11:30am - 10pm (IST)

ContactKisara Mizuno
Kisara Mizuno
Customer Success Manager– Contact (Asia)

Mon - Fri, 9:30am - 5:30pm (JST)

ContactLodovica Biagi
Lodovica Biagi
Director of Operations– Contact (Europe)

Mon - Fri, 9:30am - 5pm (GMT)

ContactCatalina Rodriguez
Catalina Rodriguez
Key Account Manager - LAC– Contact (Latin America)

Mon - Fri, 9am - 6pm (EST)