Skip navigation

The 2022 Duo Trusted Access Report

Logins in a Dangerous Time

As global conflicts spill over into the digital realm, protecting the individual through to the enterprise has taken on a greater sense of urgency. Learn how companies responded to complex global challenges — or missed the mark — and more in Duo’s 2022 Trusted Access Report.

Get The Full Report

A remote worker authenticates with username

Introduction 

The Trusted Access Report is an annual report analyzing Duo product data — and how our customers are using Duo. This year’s report has taken a decidedly different tone from last year’s iteration, in light of the world stage we find ourselves on.  

This is not a chance to press upon fear, uncertainty and doubt. Rather, it’s an opportunity to understand the gravity of where security stands today. As global conflicts spill over into the digital realm, the idea of protecting the individual through to the enterprise has taken on a greater sense of urgency.  

In the report, we explore data findings gleaned through review of more than 13 billion authentications from almost 50 million different devices across our customer base in North America, Latin America, Europe, Middle East, and the Asia Pacific, over the course of a year.   

Did you know

Duo Push-based authentication was used by 92% of all global accounts.

The 2022 Duo Trusted Access Report

Report Overview

An MFA or 2FA user authenticates for trusted access security control

MFA Continues to Strengthen Passwords 

We see a concerted effort to move all access to multi-factor authentication (MFA), not only to reduce the risk to the individual and organization, but also to streamline security operations.   

 

A digital remote work user jogs alongside a cloud to represent cloud-based technologies in cybersecurity

Cloud Usage Continues to Rise 

Year-over-year data indicate that remote access and cloud application use are here to stay, and will likely increase in the future. 

Report Highlights

81 percent icon

The percentage of phones with biometrics enabled held steady at around 81%. 

less than 1% icon

Less than 1% of organizations implement explicit geographic-based deny or allow policies.

28 percent icon

Duo Push is the most used authentication method, at 27.6% of all authentications.  

52 percent

Failures due to out-of-date devices increased 51.8% between 2021 and 2022. 

50 percent icon

50% increase in the percentage of accounts allowing WebAuthn authentication since April 2019.

MFA Continues to Strengthen Passwords

Multi-factor authentication holds strong while adding to the security of only traditional password usage. The number of MFA authentications using Duo rose by 38% in the past year. We’re also seeing an increasingly global adoption of MFA authentications from Ireland, Japan, India, Canada, and the Philippines. This demonstrates that a wider base of countries are rising to the challenge, defending their systems against the threats of today.

Increase in MFA Authentications

The percent increase in MFA among countries with the highest number of integrations.

Looks Like You Have Javascript Disabled

This content is animated. To view it, please enable Javascript in your browser (you’ll be glad you did, trust us!).

Cloud Usage Continues to Rise

An increasing number of authentications are attributed to cloud applications with a 24% rise in the percentage of cloud applications in 2022. The year-over-year change between 2021 and 2022 indicates that remote access and cloud application use has continued its upward trajectory and will continue to do so for quite some time.

Year over Year Increase in Cloud Applications

Looks Like You Have Javascript Disabled

This content is animated. To view it, please enable Javascript in your browser (you’ll be glad you did, trust us!).

The 2022 Duo Trusted Access Report for Access Data Security

The 2022 Duo Trusted Access Report

In this report, you'll:

  • Learn how enterprises evolved in the face of global conflict
  • Explore how hybrid work changes the landscape of security workflows
  • Find out how companies use device trust to gain visibility into devices on their network without violating users’ privacy
  • Discover which countries are the most restricted based on security policies
  • Read about different industries implementing different policies to enforce device trust