![]() ![]() Expenditures on services nears a quarter of all spending.CISOs should closely scrutinize on-premises spending to determine if it aligns with the cloud and modernization strategy of the overall IT organization. Since many applications and workloads have transitioned to the cloud, this suggests potential misallocation of security budget. When we combine the expenditures for maintenance and licensing, upgrades, and new investment, on-premises technology spending is by far the largest expenditure in the security budget - 41% for those in the lower-budget bracket and 38% for those in the higher-budget bracket. On-premises technology spending remains significant despite the shift to cloud.Security teams are spending a notable amount on cloud security, but given the percentage of workloads migrating to the cloud, they need to spend far more. They anticipate 58% will have moved in the next two years. Forrester’s 2021 data shows that, on average, infrastructure decision-makers at US enterprises have migrated 45% of their total application portfolio to a public cloud. Firms are reaching a new scale of cloud usage - particularly in the US. Cloud security spending continues to ratchet up.Compare your spending against our data to uncover where you may already be over- or underspending: ![]() Our data provides a comparison of security budgets by two brackets: those that spend 0% to 20% of the IT budget on security and those that spend more than 20%. Benchmark Current Spendingįorrester’s Security Survey, 2021 provides an essential overview of budgetary allocation for security (see Figure 1). And while business leaders are far less likely to target security investments during economic downturns, it would be unwise for S&R leaders not to join their IT counterparts to assess their spending across the board to ensure maximum value. S&R leaders must manage these challenges at a time when instilling and maintaining trust with customers, employees, and partners is a business imperative and when geopolitical events and technology disruption continue to fuel a highly sophisticated and evolving threat landscape. However, this raised profile has created new challenges, including a growing list of cybersecurity technologies and vendors necessary to provide protection continued staffing shortages that compromise the ability to roll out new technologies (and support existing ones) and extensive rework and customization to integrate specific technologies to meet business requirements. As a result, security, privacy, and other risk leaders now find themselves in demand from the board and throughout the enterprise. The continued onslaught of breaches, ransomware, legislation, and third-party requirements has forced executives outside of security to recognize the importance of comprehensive cybersecurity controls. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |