SlideShare a Scribd company logo
To learn more about the security purchase process
and how Foundry can help you identify content
gaps to help you better engage with your audience,
contact your Foundry sales representative.
Understanding the
security purchase process
Decision-making within the
security purchase process
1
Source: Foundry Customer Engagement, 2022; Foundry Role & Influence
of the Technology Decision-Maker, 2022; Foundry Security Priorities, 2022
Tech marketers
have a little more
work to do…
59%
of security-specific
downloaded content
has provided value
to ITDMs in the past
12 months
52%
of IT decision-makers
expect their security
budget to increase
in the next 12 months
Post sales engagement
IT/networking management 35%
CIO or top IT exec 33%
IT/networking staff 29%
Security purchase types
in the next 6–12 months
Upgrade 48%
Additional purchase 29%
Replacement 23%
$65M
Determine the business need
CIO or top IT executive 53%
CEO 52%
COO 31%
Determine technical
requirements
CIO or top IT executive 49%
IT/networking staff 43%
IT/networking management 42%
Evaluate products and services
IT/networking management 45%
IT/networking staff 44%
CIO or top IT executive 43%
Authorize or approve purchase
of products and services
CEO 46%
CIO or top IT executive 41%
CFO 35%
5.9 months
6 pieces
of content
is the average number
that security-focused
decision-makers download
to aid them throughout
the purchase process
Most relied-upon
pieces of content
• Technology news
• Product testing/
reviews/opinions
• Product demo/
product literature
Top sources of
information
• Tech content sites
• White papers
• Tech vendors
(via vendor website)
Security buyers prefer custom
tailored content
Based on industry 56%
Based on technology
platform(s) already installed
at their organization 48%
Based on company size 40%
Current average security
budget (all products,
systems, services, and staff)
19
2
3
Sell internally
CIO or top IT executive 46%
IT/networking management 35%
CSO/CISO or top
security executive 27%
5
Recommend or select
vendors for purchase
CIO or top IT executive 48%
IT/networking management 42%
IT/networking staff 36%
4
6
7
Who’s involved at each stage
of the purchase process?
65%
of ITDMs agree that
when a new CIO or
IT leader comes on
board, they often
see an influx of
spending to bring
on new tools
51%
of ITDMs will seek
a new vendor when
purchasing security
solutions
41% said this is
because their current
product or service
no longer meets their
business need
The content that’s educating
security decision-makers
What’s the average
security buying cycle?
What’s the average
number of people
involved in the security
purchase process?
IT 10
LOB 9
78%of ITDMs agree
they spend more time reading
content from known and trusted
brands because they’re confident
their time will be well spent

More Related Content

PPTX
Mind of the IT Pro 2017
PDF
Security Priorities Sample Slides 2023.pdf
PDF
2017 Role & Influence of the Technology Decision-Maker
PDF
How The IT Buy Goes Down
PPTX
4 nurturing the it committee ppt-sg-k2 (final)
PDF
Foundry Customer Engagement Study 2021
PDF
LinkedIn B2B IT Committee Insights
PDF
R if security_priorities_03.08.22
Mind of the IT Pro 2017
Security Priorities Sample Slides 2023.pdf
2017 Role & Influence of the Technology Decision-Maker
How The IT Buy Goes Down
4 nurturing the it committee ppt-sg-k2 (final)
Foundry Customer Engagement Study 2021
LinkedIn B2B IT Committee Insights
R if security_priorities_03.08.22

Similar to R_IF_Security Purchase Process.pdf (20)

PPTX
Considering the New IT Buyer
PPTX
TechConnect Sydney
PDF
Security Priorities Sample Slides 2023.pdf
PDF
Foundry Role & Influence of the Technology Decision-Maker Research 2022
PDF
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
PDF
CIO Tech Poll: Tech Priorities 2020
PDF
2020 Vision: Where Is IT headed for Midmarket and Small Business?
PPTX
CompTIA 11th Annual Information Security Trends
PPTX
CompTIA - IT Security Sales Practices in the Channel
PPTX
CIO State of Mind
PDF
Foundry Customer Engagement Study 2022
PDF
NEW_Security Priorities 2021_Sample Slides.pdf
PDF
Security Priorities 2022 Sample Slides.pdf
PDF
The cognitive advantage
PDF
The cognitive advantage: Insights from early adopters on driving business value
PDF
Webinar: From Hurting to Helping: How to Earn Quality IT Leads with Trust
PDF
Nurturing the IT Committee Lead: Is Marketing Helping or Hurting?
PPTX
Digital organizations study
PPTX
CompTIA 2014 IT Trends in Review
PDF
Role and Influence Sample Slides 2023.pdf
Considering the New IT Buyer
TechConnect Sydney
Security Priorities Sample Slides 2023.pdf
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
CIO Tech Poll: Tech Priorities 2020
2020 Vision: Where Is IT headed for Midmarket and Small Business?
CompTIA 11th Annual Information Security Trends
CompTIA - IT Security Sales Practices in the Channel
CIO State of Mind
Foundry Customer Engagement Study 2022
NEW_Security Priorities 2021_Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
The cognitive advantage
The cognitive advantage: Insights from early adopters on driving business value
Webinar: From Hurting to Helping: How to Earn Quality IT Leads with Trust
Nurturing the IT Committee Lead: Is Marketing Helping or Hurting?
Digital organizations study
CompTIA 2014 IT Trends in Review
Role and Influence Sample Slides 2023.pdf

More from IDG (20)

PDF
2023 Digital Business sample slides.pdf
PDF
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
PDF
CIO Tech Priorities 2023_Sample Slides.pdf
PPTX
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
PDF
State of the CIO 2023 Sample Slides.pdf
PDF
R-PPT_ABM Benchmarking_2022_sample slides.pdf
PDF
Foundry Partner Marketing Study 2022
PDF
R_IF_DataAnalytics22_070822.pdf
PDF
Foundry Future of Work Study 2022
PDF
Data & Analytics Sample Slides_NEW.pdf
PDF
R if data_analytics_03.08.22
PDF
Foundry Partner Marketing Research 2020
PDF
Foundry Data & Analytics Study 2021
PDF
Foundry Digital Business Research 2021
PDF
Stateofthe cio 2022 new sample slides
PDF
Stateofthe cio 2022 sample slides
PDF
Stateofthe cio 2022 sample slides
PDF
Data Analytics is Driving The Business Forward
PDF
Final 2021 security_priorities_infographic (1)
PDF
2021 security priorities infographic
2023 Digital Business sample slides.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO 2023 Sample Slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
Foundry Partner Marketing Study 2022
R_IF_DataAnalytics22_070822.pdf
Foundry Future of Work Study 2022
Data & Analytics Sample Slides_NEW.pdf
R if data_analytics_03.08.22
Foundry Partner Marketing Research 2020
Foundry Data & Analytics Study 2021
Foundry Digital Business Research 2021
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
Data Analytics is Driving The Business Forward
Final 2021 security_priorities_infographic (1)
2021 security priorities infographic

Recently uploaded (20)

PDF
SEO vs. AEO: Optimizing for Google vs AI-Powered Search Assistants
PPTX
Best Digital marketing service provider in Chandigarh.pptx
PDF
Biography of Brady Beitlich
PPTX
Presentation - GreenPantry – Instagram-First Home Kitchen Brand.pptx
PDF
Best digital marketing company in Mumbai
PPTX
Tea and different types of tea in India
PDF
Digital Marketing - clear pictire of marketing
PPT
Introduction to consumer behavior(1).PPT
PPTX
CH 1 AN INTRODUCTION OF INTEGRATED MARKETING COMMUNICATION (COMBINE)
PPTX
Ipsos+Protocols+Playbook+V1.2+(DEC2024)+final+IntClientUseOnly.pptx
PDF
Wondershare Filmora Crack Free Download 2025
PDF
Digital Marketing Agency vs Freelancers and VAs: Which Should You Hire in 2025
PPTX
APA Examples Reference Examples Style and
PDF
RC 14001 Certification: Enhancing ISO 14001 with EHS & Security Standards
PPTX
SaaS intelligence platform for B2B founders and marketers - Toksta
PPTX
Strategic Sage Digital-The Professional Digital Marketing Company in Mohali.pptx
PDF
DigiBrandX: Crafting Identities That Resonate
PPTX
CH 2 The Role of IMC in the Marketing Process (combined)
PDF
The Role of Search Intent in Shaping SEO Strategies in 2025
PDF
Nurpet Packaging Company Profile (Basic)
SEO vs. AEO: Optimizing for Google vs AI-Powered Search Assistants
Best Digital marketing service provider in Chandigarh.pptx
Biography of Brady Beitlich
Presentation - GreenPantry – Instagram-First Home Kitchen Brand.pptx
Best digital marketing company in Mumbai
Tea and different types of tea in India
Digital Marketing - clear pictire of marketing
Introduction to consumer behavior(1).PPT
CH 1 AN INTRODUCTION OF INTEGRATED MARKETING COMMUNICATION (COMBINE)
Ipsos+Protocols+Playbook+V1.2+(DEC2024)+final+IntClientUseOnly.pptx
Wondershare Filmora Crack Free Download 2025
Digital Marketing Agency vs Freelancers and VAs: Which Should You Hire in 2025
APA Examples Reference Examples Style and
RC 14001 Certification: Enhancing ISO 14001 with EHS & Security Standards
SaaS intelligence platform for B2B founders and marketers - Toksta
Strategic Sage Digital-The Professional Digital Marketing Company in Mohali.pptx
DigiBrandX: Crafting Identities That Resonate
CH 2 The Role of IMC in the Marketing Process (combined)
The Role of Search Intent in Shaping SEO Strategies in 2025
Nurpet Packaging Company Profile (Basic)

R_IF_Security Purchase Process.pdf

  • 1. To learn more about the security purchase process and how Foundry can help you identify content gaps to help you better engage with your audience, contact your Foundry sales representative. Understanding the security purchase process Decision-making within the security purchase process 1 Source: Foundry Customer Engagement, 2022; Foundry Role & Influence of the Technology Decision-Maker, 2022; Foundry Security Priorities, 2022 Tech marketers have a little more work to do… 59% of security-specific downloaded content has provided value to ITDMs in the past 12 months 52% of IT decision-makers expect their security budget to increase in the next 12 months Post sales engagement IT/networking management 35% CIO or top IT exec 33% IT/networking staff 29% Security purchase types in the next 6–12 months Upgrade 48% Additional purchase 29% Replacement 23% $65M Determine the business need CIO or top IT executive 53% CEO 52% COO 31% Determine technical requirements CIO or top IT executive 49% IT/networking staff 43% IT/networking management 42% Evaluate products and services IT/networking management 45% IT/networking staff 44% CIO or top IT executive 43% Authorize or approve purchase of products and services CEO 46% CIO or top IT executive 41% CFO 35% 5.9 months 6 pieces of content is the average number that security-focused decision-makers download to aid them throughout the purchase process Most relied-upon pieces of content • Technology news • Product testing/ reviews/opinions • Product demo/ product literature Top sources of information • Tech content sites • White papers • Tech vendors (via vendor website) Security buyers prefer custom tailored content Based on industry 56% Based on technology platform(s) already installed at their organization 48% Based on company size 40% Current average security budget (all products, systems, services, and staff) 19 2 3 Sell internally CIO or top IT executive 46% IT/networking management 35% CSO/CISO or top security executive 27% 5 Recommend or select vendors for purchase CIO or top IT executive 48% IT/networking management 42% IT/networking staff 36% 4 6 7 Who’s involved at each stage of the purchase process? 65% of ITDMs agree that when a new CIO or IT leader comes on board, they often see an influx of spending to bring on new tools 51% of ITDMs will seek a new vendor when purchasing security solutions 41% said this is because their current product or service no longer meets their business need The content that’s educating security decision-makers What’s the average security buying cycle? What’s the average number of people involved in the security purchase process? IT 10 LOB 9 78%of ITDMs agree they spend more time reading content from known and trusted brands because they’re confident their time will be well spent