This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.
IT security budget in 2021
Threats experienced in the last 12 months
Security measures in place
IT and telecoms companies, data centers and cloud infrastructures, are at the forefront of implementing the newest technological advances, but they are also at the forefront when it comes to encountering the most cyber threats. They have one of the highest rates of virtual infrastructure cyber incidents, not to mention the fact they have to fight off huge amounts of malware and encounter DDoS and similar attacks every day. This means that, besides building a multi-layered defense against malware, they should be using specialized security solutions optimized for virtual environments, and should invest in cyber-awareness training for their staff. Only complete fully-fledged cybersecurity solutions for data centers and cloud-based systems can ensure the continuity of service that is such an important customer consideration for these organizations when they are selecting or changing provider.
European IT and telecoms companies have to counter targeted attacks and withstand DDoS attacks. We recommend they do this with the latest IT security solutions, combined with threat intelligence and cybersecurity services, anti-targeted attack and DDoS protection.
*These statistics are based on results from an online survey of 3,063 business representatives from companies with 50 and up to 4,999 employees around the world, conducted in 2021 by Kaspersky and B2B International. Statistics based on less than 30 respondents should be used with caution, due to this being a low base.
** The methodology for measuring endpoint protection represents the penetration of endpoint protection in businesses meaning the proportion of corporate endpoints (both physical devices and virtual endpoints) that have endpoint security software installed in the average organization of this vertical and segment