Multi-vendor Survey Report

Why Sponsor a Survey Report?

Sponsoring a CyberEdge multi-vendor survey report based on the findings from a web-based market research survey yields numerous benefits for cybersecurity vendors, including:

  • Demonstrating thought leadership in your industry
  • Generating new, and nurturing existing, top-of-funnel leads
  • Validating the need for your product or service category
  • Improving brand awareness through media coverage
  • Feeding your hungry social media program

Multi-vendor Survey Report Schedule

2024 State of Cloud Security Defenses
October 2024
2025 State of Security Operations
December 2024
2025 State of Managed Security Services
February 2025
2025 Cyberthreat Defense Report
April 2025
2025 State of Identity Security
June 2025
2025 State of Zero Trust Security
August 2025
2025 State of Cloud Security Defenses
October 2025

About This Report:

Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on cloud security tools that defend against sophisticated threats and/or embrace cloud infrastructure for efficient delivery of modern cybersecurity defenses. This report will delve into the minds of cloud security practitioners to understand which threats concern them most, cloud security technologies they plan to acquire in the coming year, and best practices they currently embrace to mitigate cloud-based cybersecurity risks.

Vendor Fit:

All cloud security vendors, including those that offer secure access service edge (SASE), cloud-native application protection platform (CNAPP), cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection platform (CWPP), cloud detection and response (CDR), cloud-based network security tools (e.g., NGFW, IPS, WAF, SWG, SEG, DLP), and other cloud security solutions.

About This Report:

Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on security operations tools that enable security teams to work more efficiently and effectively. This report will delve into the minds of security operations professionals to understand the challenges they face, the security operations tools they use to overcome them, and best practices they currently embrace to mitigate today’s cybersecurity risks.

Vendor Fit:

All security operations vendors, including those that offer security information and event management (SIEM), vulnerability management (VM), security configuration management (SCM), patch management, penetration testing, threat intelligence platform (TIP), security orchestration and response (SOAR), user and entity behavior analytics (UEBA), advanced security analytics, cyber risk quantification / scorecards, and other security operations solutions.

About This Report:

Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on managed security service providers (MSSPs) to perform critical information security functions, such as cyberthreat hunting, monitoring and managing security infrastructure (e.g., SIEM, NGFW, IPS, WAF, SWG, SEG), DDoS prevention, vulnerability management, and other everyday information security tasks.

Vendor Fit:

All security vendors that provide managed security services (MSS), including managed security service provider (MSSP), managed detection and response (MDR), managed extended detection and response (MXDR), and more.

About This Report:

CyberEdge’s flagship Cyberthreat Defense Report (CDR) has rapidly become the de facto standard for assessing organizations’ security posture, for gauging perceptions of cybersecurity professionals, and for ascertaining current and planned cybersecurity investments. Each year for more than a decade, CyberEdge surveys 1,200 IT security professionals from 17 countries and 19 industries. The CDR is by far the most comprehensive, geographically diverse, vendor-agnostic research report in the IT security industry. CyberEdge’s Silver, Gold, and Platinum sponsors make this annual report possible.

Vendor Fit:

All IT security software vendors and service providers that offer solutions for detecting cyberthreats and mitigating cybersecurity risks.

About This Report:

Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on identity security tools to mitigate the risk of identity-based threats and safeguard company applications and data. This report will delve into the minds of security practitioners to understand which identity-based threats concern them most, which identity security technologies they plan to acquire in the months ahead, and best practices they currently embrace to mitigate identity- based cybersecurity risks.

Vendor Fit:

All security vendors that offer identity security solutions, including identity and access management (IAM), multi-factor authentication (MFA), passwordless authentication, single sign-on (SSO), privileged access management (PAM), user and entity behavior analytics (UEBA), identity governance and administration (IGA), biometric authentication systems, and other identity security solutions.

About This Report:

Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on zero trust security solutions to defend against today’s most sophisticated threats. This report will delve into the minds of security practitioners to understand which threats concern them most, zero trust security technologies they plan to acquire in the months ahead, and zero trust best practices they currently embrace to mitigate cybersecurity risks.

Vendor Fit:

All security vendors who offer software, hardware, and/or services pertaining to zero trust security frameworks, including those that offer identity and access management (IAM), multi-factor authentication (MFA), microsegmentation, privileged access management (PAM), endpoint security solutions, network access control (NAC), encryption, and other related security technologies.

About This Report:

Survey of 500 IT security professionals from countries in North America, Europe, and Asia Pacific about their reliance on cloud security tools that defend against sophisticated threats and/or embrace cloud infrastructure for efficient delivery of modern cybersecurity defenses. This report will delve into the minds of cloud security practitioners to understand which threats concern them most, cloud security technologies they plan to acquire in the coming year, and best practices they currently embrace to mitigate cloud-based cybersecurity risks.

Vendor Fit:

All cloud security vendors, including those that offer secure access service edge (SASE), cloud-native application protection platform (CNAPP), cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection platform (CWPP), cloud detection and response (CDR), cloud-based network security tools (e.g., NGFW, IPS, WAF, SWG, SEG, DLP), and other cloud security solutions.

Scheduled Upon Request

202X State of Advanced Threat Defenses

202X State of Cyber Risk Quantification

202X State of Digital and Network Forensics

202X State of Email Security

202X State of Extended Detection and Response (XDR)

202X State of ICS/OT Security

202X State of Identity Security

202X State of Ransomware Defenses

202X State of Remote Workforce Security

202X State of Third-party Risk Management (TPRM)

202X State of Threat Intelligence Services

202X State of Zero Trust Security

Data Quality and Analysis That is Second to None

There are many cybersecurity research vendors who create survey reports. But none of them matches CyberEdge’s data quality, analysis, geographic reach, or breadth of available sponsorship deliverables.

CyberEdgeOther Researchers
DATA QUALITY
Minimum sample size and survey margin of error YesVaries
Restrict responses by job role, employee count, and industry YesVaries
Prevent disqualified respondents from re-starting survey YesNo
Minimum employee count for respondents 5001
Provide “Don’t know” responses so respondents aren’t forced to answer questions outside their knowledge baseYesNo
Randomize repsponses to prevent order bias YesNo
Translate survey for Non-English speakers YesNo
GEOGRAPHIC REACH
Guarantee exact sample size by country YesNo
North AmericaYesYes
EuropeYesVaries
Asia & ANZYesRarely
Middle East & AfricaYesRarely
Latin AmericaYesRarely
PROJECT DELIVERABLES
Survey ReportReport with deep analysisReport with statistics only
Webinar participationYes, by subject matter expertYes, subject matter expertise varies
Raw summarized data for self-analysisYesRarely
Content syndication leads with ability to specify filters, such as countries, industries, job roles, and organization sizeOptional, and can specify filtersVaries, but can’t specify filters
Localized report and infographic in languages of choiceOptional No

View Our Portfolio

Check out our multi-vendor survey report samples in our portfolio.

The CyberEdge Advantage

  • 100% dedicated to serving IT security vendors
  • Research reports created by cybersecurity subject matter experts
  • Data quality and analysis that is truly second to none
  • Broad geographic reach beyond any other research provider
  • High-quality IT security leads from organizations with 500+ employees
CEGicon White 02

“I’ve worked with CyberEdge since it was founded. Over the years, I’ve relied on CyberEdge for custom books and eBooks, white papers, competitive analysis, custom research, and messaging development. I’ve never encountered a marketing firm with so much expertise. CyberEdge is more than a vendor to me – they’re a strategic marketing partner.”
John Vecchi
Veteran Cybersecurity CMO