48AF3A60-914C-4C95-B1E0-3397FF00C1E9 Created with sketchtool.
Calculator
META, All industries, 4 999 employees
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • APAC
  • China
  • Europe
  • Japan
  • LATAM
  • META
  • North America
  • Russia
7E919FA3-84AA-4530-B42D-91BADB226992 Created with sketchtool.
  • All
  • Financial Services
  • Government
  • Industrial/Manufacturing
  • IT & Telecoms
  • Retail & Wholesale
$
Calculate
Calculate your company's security profile

This is the ultimate guide to the cost of IT security. Select the details that match your company to see the average budgets your industry peers spend on IT security (by region, industry, size), what security measures they take, the major threat vectors they encounter, how much money they lose as a result, and what you can do to avoid being compromised. The Calculator has been created as an adjustable tool. The data presented can be updated and/or added to over time based on insights from customers and Kaspersky.

IT security budget in 2020
Data provided by 97 respondents*
META, All industries, 4 999 employees
IT Security budget makes up 31% of the total IT spend
View analytics for previous years
average
$ 7 087 334
average
$ 7 087 334
max
$ 82 500 000
2020
2023
Expected change to IT security budget in three years
+ 9 %
year
2020
2023
YoY Dynamics
Find out data for my company
Threats experienced in the last 12 months
Data provided by 110 respondents*
META, All industries, 4 999 employees
56%
Viruses & malware
55%
Malware infection of BYOD devices
55%
Inappropriate IT resource use by employees
52%
Data breach
50%
IT Security policies violation by employees
49%
Physical loss of company owned mobile devices exposing the organization to risk
48%
Physical loss of devices or media
47%
Inappropriate sharing of data via mobile devices
46%
Phishing / social engineering attacks on accounts
45%
Electronic leakage of data from internal systems
44%
Physical loss of BYOD devices
42%
Attacks on local / branch offices of our company
42%
Fileless attacks
42%
Targeted attacks
42%
Cryptomalware/ransomware
41%
Incidents involving non-computing connected devices
41%
Supply chain attacks
41%
DDoS attacks
40%
Cryptomining attacks
39%
Incidents affecting suppliers that the business shares data with
26%
Incidents affecting IT Infrastructure hosted by a third party
25%
Incidents affecting virtualized environments
20%
Attacks on point-of-sale (POS) systems
16%
Incidents affecting third party cloud services used by the business
6%
Attacks on online banking services
6%
Financial losses due to attacks on ATM
5%
Attacks on core transactional / back office systems
80%
Any cyberthreat
$ 896 352
Average cost of one incident
Security measures in place
Data provided by 68 respondents*
META, All industries, 4 999 employees
67%
Endpoint Protection**
94%
Network Securitу
91%
Web Security
91%
Services - Threat intelligence
87%
Mobile Security
87%
Services - Managed Detection & Response
85%
Services - Security Assessment
84%
Services - Security Education & Training
84%
Storage array / network attached storage security software
84%
Messaging Security
84%
Cloud Workload Security
84%
Security for Virtualization
82%
Services - Incident Response
79%
Security solutions specifically designed for SaaS applications
79%
Anti-DDoS Protection
78%
Industrial Cybersecurity
78%
Network Sandboxing
75%
Advanced Persistent Threat (APT) Protection
75%
IoT - Transportation Security
74%
Container Security
68%
SIEM
65%
SOAR
16%
Services - Industrial Cybersecurity Assessment
Recommendations

IT and telecoms companies, data centers and cloud infrastructures, are at the forefront of implementing the newest technological advances, but they are also at the forefront when it comes to encountering the most cyber threats. They have one of the highest rates of virtual infrastructure cyber incidents, not to mention the fact they have to fight off huge amounts of malware and encounter DDoS and similar attacks every day. This means that, besides building a multi-layered defense against malware, they should be using specialized security solutions optimized for virtual environments, and should invest in cyber-awareness training for their staff. Only complete fully-fledged cybersecurity solutions for data centers and cloud-based systems can ensure the continuity of service that is such an important customer consideration for these organizations when they are selecting or changing provider.

IT and telecoms companies operating in your region deal with a wide range of threats, from targeted attacks and DDoS attacks to incidents with partners, suppliers and infrastructure hosted by third parties, along with data leaks from internal services. Therefore, they are encouraged to equip themselves with anti-targeted attack solutions, DDoS protection, data center security solutions, and reserve some of their budget for a cybersecurity services contract.

Want to see more statistics?
Fill out this form to download the IT security economics 2020 executive summary: «Investment adjustment: aligning IT budgets with changing security priorities»
Download report
Need help with IT security?
Fill out this form and Kaspersky experts will get in touch
Contact me
*These statistics are based on results from an online survey of 5,266 business representatives from companies with 50 and up to 4,999 employees around the world, conducted in 2020 by Kaspersky and B2B International. Statistics based on less than 30 respondents should be used with caution, due to this being a low base. The significant increase in the IT security budget in 2020 may be caused by the change of the survey sample for several verticals and significant fluctuations in budgets in these verticals.

** The methodology for measuring endpoint protection has been changed: now it represents the penetration of endpoint protection in businesses meaning the proportion of corporate endpoints (both physical devices and virtual endpoints) that have endpoint security software installed in the average organization of this vertical and segment.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information

Accept and Close