Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityPhysicalSecurity Newswire

The economics of the security operations center: What's the true cost?

The true cost of the security operations center
January 22, 2021

The Second Annual Study on the Economics of Security Operations Centers: What is the True Cost for Effective Results? report from Ponemon Institute and sponsored by FireEye Inc. finds that organizations are spending more to account for widespread security operation center (SOC) challenges including growing security management complexity, increasing analyst salaries, security engineering and management outsourcing costs, yet are still dissatisfied with the outcomes. However, companies are also boosting investments in new SOC tools and security automation to help solve these issues. The Ponemon Institute surveyed 682 SOC managers, security analysts, general security practitioners, IT managers and directors who have a Security Operations Center in their organizations.

“The findings of the Ponemon Economics of the SOC report show that organizations are facing an onslaught of rising security operations costs, but despite these increased investments, are still unhappy with their ability to combat growing cyberthreats,” said Chris Triolo, Vice President of Customer Success, FireEye. “Many security teams are now seeking new technologies that can provide greater efficiencies and visibility, while cutting alert overloads and eliminating mundane tasks to improve analyst morale.”

Perceived ROI of the SOC Drops, While Costs Rise

The ROI of SOC investments have been worsening, due to increasing complexity and rising security engineering and management outsourcing costs.

  • Perceived ROI of the SOC is Dropping Due to Management Complexity: More than half (51%) of respondents say the ROI of the SOC is getting worse, compared to 44% in 2019. More than 80% rate their SOC’s complexity as very high, rising from 74% in 2019.
  • Rising Outsourcing Costs Lessen Appeal: The cost to pay MSSPs for security monitoring also increased and may impact ROI. The average cost for respondents is $5,307,250 annually, an increase from $4,441,500 in 2019 (i.e., approximately 20% year over year).
  • High Security Engineering Costs Aren’t Resolving Needs: Organizations surveyed are spending an average of $2,716,514 per year on security engineering. However, only 51% of respondents rate their security engineering efforts as effective or very effective.

SOC Workers Unhappy, Despite Increasing Salaries

Even with increasing salaries, organizations are not able to boost employee morale, according to the study.  

  • Security Analyst Morale Impacted by Long Hours and Demanding Work: 85% of respondents say working in the SOC is painful or very painful, with this sentiment growing from 72% in 2019. Increasing workloads and being on call are overwhelming security analysts, with 75% saying that these factors cause burnout, rising from 70% in 2019.
  • SOCs Can’t Meet the Rate of Security Analyst Turnover: Despite organizations surveyed expecting to hire an average of five analysts in 2021, three will resign or be fired in one year. Organizations are increasing security analyst salaries, with the average rising from $102,000 in 2019 to $111,000 in 2020. However, only 38% still believe they can hire the right talent.

New Technology Investments Show Promise

However, increasing investments in new XDR and security automation tools show promise to reduce security engineering costs, boost SOC performance and employee morale.

  • XDR and Security Automation Budgets are Increasing: Organizations are investing in XDR as an emerging category to improve SOC performance. Organizations surveyed intended to spend an average of $333,150 for XDR; $345,150 for SOAR; $285,150 for MDR; and $183,150 for SIEMs.

The SOC is Key for Maintaining Security Posture

Despite current ROI perception, respondents noted that the SOC is more important than ever to having a strong security posture.

  • The SOC is Essential: The number of respondents who said their SOC is essential or very important increased from 73% last year to 80% now. Meanwhile, the most important SOC activities are: Minimizing false positives reporting (88%); having agile DevOps functions (increasing from 73 to 85%); and automating machine learning tools (increasing from 72 to 80%).

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The True Cost of Crime: $41,000 and Up

    See More
  • Cybersecurity Leadership Images

    Report Reveals the True Cost of Data Breaches

    See More
  • River Oaks Shopping Center

    The True Cost & Consequences of Vacant Properties

    See More

Related Products

See More Products
  • operations center.jpg

    Security Operations Center Guidebook

  • databasehacker

    The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing