48AF3A60-914C-4C95-B1E0-3397FF00C1E9 Created with sketchtool.
Calculator
APAC, IT & Telecoms, 4 999 employees
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • APAC
  • China
  • Europe
  • Japan
  • LATAM
  • META
  • North America
  • Russia
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • Financial Services
  • Government
  • Industrial/Manufacturing
  • IT & Telecoms
  • Retail & Wholesale
$
Calculate
Data collected separately for Japan from 2020. Choose Japan the region to see data for Japan from 2020
Calculate your company's security profile

This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.

IT security budget in 2020
Data provided by 23 respondents*
APAC, IT & Telecoms, 4 999 employees
IT Security budget makes up 34% of the total IT spend
View analytics for previous years
average
$ 5 527 702
average
$ 5 527 702
max
$ 20 625 000
2020
2023
Expected change to IT security budget in three years
+ 15 %
year
2020
2023
YoY Dynamics
Find out data for my company
Threats experienced in the last 12 months
Data provided by 25 respondents*
APAC, IT & Telecoms, 4 999 employees
64%
Data breach
64%
Phishing / social engineering attacks on accounts
56%
Malware infection of BYOD devices
52%
IT Security policies violation by employees
52%
Targeted attacks
48%
Inappropriate sharing of data via mobile devices
48%
Physical loss of devices or media
48%
Attacks on point-of-sale (POS) systems
48%
Inappropriate IT resource use by employees
48%
Incidents involving non-computing connected devices
48%
DDoS attacks
48%
Cryptomalware/ransomware
44%
Incidents affecting suppliers that the business shares data with
44%
Viruses & malware
44%
Electronic leakage of data from internal systems
44%
Fileless attacks
44%
Supply chain attacks
44%
Attacks on local / branch offices of our company
40%
Incidents affecting IT Infrastructure hosted by a third party
36%
Physical loss of BYOD devices
32%
Incidents affecting virtualized environments
32%
Cryptomining attacks
32%
Physical loss of company owned mobile devices exposing the organization to risk
28%
Incidents affecting third party cloud services used by the business
84%
Any cyberthreat
$ 564 531
Average cost of one incident
Security measures in place
Data provided by 22 respondents*
APAC, IT & Telecoms, 4 999 employees
86%
Web Security
82%
Network Securitу
77%
Services - Security Education & Training
77%
Mobile Security
77%
Security for Virtualization
77%
Cloud Workload Security
73%
Advanced Persistent Threat (APT) Protection
73%
Industrial Cybersecurity
68%
Services - Managed Detection & Response
68%
IoT - Transportation Security
64%
Storage array / network attached storage security software
64%
Security solutions specifically designed for SaaS applications
64%
Services - Security Assessment
64%
Messaging Security
64%
SOAR
62%
Endpoint Protection**
59%
Network Sandboxing
59%
Container Security
59%
Services - Threat intelligence
55%
Anti-DDoS Protection
55%
Services - Incident Response
55%
SIEM
Recommendations

IT and telecoms companies, data centers and cloud infrastructures, are at the forefront of implementing the newest technological advances, but they are also at the forefront when it comes to encountering the most cyber threats. They have one of the highest rates of virtual infrastructure cyber incidents, not to mention the fact they have to fight off huge amounts of malware and encounter DDoS and similar attacks every day. This means that, besides building a multi-layered defense against malware, they should be using specialized security solutions optimized for virtual environments, and should invest in cyber-awareness training for their staff. Only complete fully-fledged cybersecurity solutions for data centers and cloud-based systems can ensure the continuity of service that is such an important customer consideration for these organizations when they are selecting or changing provider.

IT and telecoms companies operating in Japan and APAC are dealing with the widest range of threats, from targeted attacks and DDoS attacks to incidents with partners, suppliers and infrastructure hosted by third parties, along with incidents with cloud services and data leaks from internal services. They are therefore encouraged to equip themselves with the latest IT security technologies and services – especially an advanced anti-targeted attack protection platform including EDR, and a threat intelligence-based SOC.

Want to see more statistics?
Fill out this form to download the IT security economics 2020 executive summary: «Investment adjustment: aligning IT budgets with changing security priorities»
Download report
Need help with IT security?
Fill out this form and Kaspersky experts will get in touch
Contact me
*These statistics are based on results from an online survey of 5,266 business representatives from companies with 50 and up to 4,999 employees around the world, conducted in 2020 by Kaspersky and B2B International. Statistics based on less than 30 respondents should be used with caution, due to this being a low base. The significant increase in the IT security budget in 2020 may be caused by the change of the survey sample for several verticals and significant fluctuations in budgets in these verticals.

** The methodology for measuring endpoint protection has been changed: now it represents the penetration of endpoint protection in businesses meaning the proportion of corporate endpoints (both physical devices and virtual endpoints) that have endpoint security software installed in the average organization of this vertical and segment.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information

Accept and Close