The purchase, maintenance and need for different cybersecurity products can be compared to how the process of evaluating, acquiring and maintaining a car is performed in the real world.
https://www.securitymagazine.com/blogs/14-security-blog/post/99225-cybersecurity-and-buying-a-car-more-alike-than-you-think