What Are IT Leaders
Actually Buying?
Insights from direct conversations with CIOs, IT Directors, VPs of Infrastructure, and Security Leaders across 1,296 organizations. Trends that took shape in 2025, continuing into 2026.
AI Has Left the Strategy Room
The "should we adopt AI?" conversation is over. IT organizations are now buying specific agents, not platforms. The shift from broad exploration to funded, named use cases happened inside a single year.
- Document OCR for healthcare faxes (thousands processed manually today)
- SQL performance optimization and query analysis
- Vehicle condition auto-decisioning using photo analysis
- Internal knowledge chatbots for HR and policy queries
- Legacy code modernization across 17 organizations, one with 105 applications in scope
"How much should we be building versus just buying?"
"The cost of using generative AI is much higher than most people expected. You have to pay for the amount of usage, and that's somewhat restrictive."
"The tool sets are just not there. Not a lot of vendors can do that."
Security: From Prevention to Response
Security remains the single most active domain but the composition is shifting fast. Broad perimeter categories are plateauing. What's surging is operational: detection, response, and identity.
"Every vendor pitches Zero Trust but requires you to use only their stack. Finding something that can integrate across everything has proven to be a nightmare."
"Every company wants to come in and say we'll manage the service for you, and then they swap you over to nine new vendors instead of the nine you're using. The cost goes through the roof."
"The only thing that really has made us look to Microsoft is obviously the way that they bundle their licensing. If we go E5, we get a whole bunch of tools and it sort of closes the gap on what we're paying individually for Sophos."
"You can mimic people really, really well now."
Backup: The False Confidence Problem
Most organizations have backup solutions. Very few have tested whether they work. There is a widening gap between what was purchased, what was deployed, and what can actually be recovered.
"I'm not sure they quite understood that when they did it."
"The schools I've talked with that have moved to the cloud are now trying to move back to premise because the cloud expenses keep going up."
The Infrastructure Disruption Map
VMware's post-Broadcom pricing changes, Windows 10 end-of-life, the Microsoft Software Assurance trap, and decade-long Oracle migrations. The infrastructure layer is under more simultaneous pressure than at any point in recent memory.
"Our hypervisor determines the direction we go with a lot of this stuff. If we stay with VMware, we don't need to change our servers. But if we step away, there are some hyper-converged players we need to look at."
"This is a huge security hole we have right now. That came up literally last week and hit me in the face pretty hard."
"The database is the easy part. The application is the challenge."
"Everything we do is manual. How important is it to automate critical network functions? It's very important and I'm not there."
The Top 10 Categories
AI and security together represent more than half of all active evaluation volume. Ranked by number of organizations actively evaluating, with median budget context for each.
| Category | Q1 2025 | Now | Status | What It Means |
|---|---|---|---|---|
| UCaaS | High | Declining | ↓ Done | Post-pandemic normalization. |
| SD-WAN | 30 | 6 | ↓ Mature | Largely implemented. Automation refresh is the real need. |
| AI-Enabled Automation | 108 | 42 | ↓ Evolved | Replaced by specific agentic use cases. |
| Cloud Security (standalone) | 73 | 29 | ↓ Embedded | Absorbed into SASE and Zero-Trust platforms. |
| Data Protection | 51 | 1 | ↓ Sharp Drop | Focus shifted to identity and detection. |
| App Performance Monitoring | 29 | 0 | ↓ Absorbed | Embedded in observability platforms. |
Who Is Buying What
Technology buying patterns vary meaningfully by sector. Compliance is the common thread, but priorities diverge sharply by industry. Healthcare and Government lead in volume, driven by the most demanding regulatory environments.
What Actually Triggers a Purchase
Based on direct conversations with IT leaders, these are the real triggers behind active evaluations, ranked by frequency across the dataset.
"We just got through budget planning. A significant number of requests were denied. I'm re-presenting the same tool sets to senior leadership for 2026 approval."
Where the Money Is Actually Going
Budget data from 3,739 evaluations. The most common project range is $100K to $250K. But significant outliers, particularly in network security and AI infrastructure, signal where enterprise-scale investment is happening.
What IT Leaders Said About Specific Vendors
Unsolicited vendor sentiment from direct conversations. What came up when IT leaders were simply asked "is there anyone you're opposed to speaking with?" The answers reveal the competitive landscape more clearly than any analyst report.
"IBM contacts me three times a year and they are highly disappointing every single time. They buy technologies and kill them."
"Once Oracle gets in your pocket, all the cash is gone."
"It's a financial decision at this point. The technology is fine. But the math is changing."
What the Data Says About Where This Goes
Trends that took shape in 2025 are now firmly established patterns continuing into 2026. Three categories to watch closely, and seven things every IT leader should know.
- 1AI is past the hype phase. Specific agentic AI use cases, IT Help Desk, HR self-service, procurement, are entering active procurement. Organizations still in exploration mode are now in the minority.
- 2Zero-Trust is being implemented by your peers right now. The question is where you are on the maturity curve relative to your sector, not whether to start.
- 3IAM is the fastest-growing security investment. As network perimeters dissolve, identity becomes the control plane. IAM ties together Zero-Trust, cloud, and remote work.
- 4MDR is the most rapidly emerging category. Organizations with prevention tools deployed are now outsourcing 24/7 detection and response. No SOC capability? This is the gap most peers are closing.
- 5Backup and restore testing are not the same thing. Almost every organization has backup. Very few have verified it works under real recovery conditions.
- 6Compliance is the most common purchase driver. HIPAA, NIST, NERC-CIP, and cyber insurance requirements are forcing investment timelines. Regulatory pressure doesn't wait for your next budget cycle.
- 7Slowing categories are largely done, not underinvested. UCaaS, SD-WAN, broad Cloud Security: these decisions have been made. Redirecting budget toward AI agents and identity is where the market is heading.