Total Economic Impact
Cost Savings And Business Benefits Enabled By Airlock Digital
A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY AIRLOCK, NOVEMBER 2025
Total Economic Impact
A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY AIRLOCK, NOVEMBER 2025
Allowlisting represents a shift from reactive to proactive security, focusing on protecting known-good resources rather than trying to identify every possible threat. This approach aligns with Zero Trust architecture and defense-in-depth strategies. Organizations that handle sensitive data or critical infrastructure are increasingly adopting allowlisting to meet strict security and compliance standards and to strengthen defenses as cyberthreats grow more sophisticated. The simple principle of denying everything except what’s explicitly approved remains effective across evolving attack methods, which makes allowlisting a consistently valuable component of comprehensive cybersecurity programs.
Airlock Digital commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Airlock Digital.1 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Airlock Digital on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four decision-makers with experience using Airlock Digital. For the purposes of this study, Forrester aggregated the experiences of the interviewees and combined the results into a single composite organization, which is a B2B organization with annual revenue of $10 billion and 20,000 endpoints.
Interviewees noted that before using Airlock Digital, their organizations had determined that a reactive security approach was insufficient. Previous proactive solutions had limited success that led to incomplete endpoint coverage, performance issues, and high maintenance costs for complex solutions. These challenges prompted the organizations to look for a new solution, and they conducted proof-of-concept (POC) trials with multiple allowlisting providers.
The interviewees reported that after investing in Airlock Digital, their organizations achieved 100% coverage of all endpoints on their networks with little or no performance-related user impact and far better visibility into network activity than they had before. Key results from the investment include an improved security posture, lower overall maintenance costs, and improved software inventory management.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
Strengthened security. Using Airlock Digital reduces the composite’s overall risk of a breach by more than 25%, which allows it to meet its compliance goals for strengthened security. Over three years, this saves the composite $4.1 million.
Reduced administrative overhead. Maintaining Airlock Digital requires one security analyst at the composite to spend about 2.5 hours per week reviewing logs and creating any necessary tickets for needed changes to protocol and policies. This is a reduction that translates to $1.3 million over three years.
Improved software inventory management. By eliminating license fees for idle applications and reducing maintenance by consolidating redundant applications, the composite organization saves $186,000 over three years.
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Enterprisewide user productivity improvements. The composite organization has fewer outages, which leads to fewer work disruptions. Airlock Digital also enforces application control for the organization without introducing latency or blocking legitimate work.
The ability to customize the solution by user group. While the enhanced security provided by Airlock Digital partially addresses this benefit, it doesn't fully encompass the flexibility required for different users to access customized allow-lists.
On-demand exceptions and transparent logging. The composite organization values that users can swiftly request a one-time pass to deploy a previously unapproved app when necessary, which helps secure organizational buy-in for the allow-listing solution.
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
Enterprise license fees. Airlock Digital license fees are based on the number of endpoints. Because the composite has 20,000 endpoints, it pays $1.2 million in license fees over three years.
Technical implementation and maintenance. One security analyst at the composite spends a total of 40 hours on the initial deployment of Airlock Digital and then 2.5 hours per week once under enforcement. In total, the organization’s technical implementation and maintenance costs are $35,000.
Policy and protocol development. The composite organization imports policies and protocols for 10,000 endpoints from its previous solution to Airlock Digital. This requires a 12-week audit and rules development period before transitioning to Airlock Digital enforcement. Over three years, the composite pays $422,000 for policy and protocol development.
The financial analysis that is based on the interviews found that a composite organization experiences benefits of $5.5 million over three years versus costs of $1.7 million, adding up to a net present value (NPV) of $3.8 million and an ROI of 224%.
Overall reduction to the risk of a security breach
Return on investment (ROI)
Benefits PV
Net present value (NPV)
| Role | Industry | Region | Annual revenue | Endpoints |
|---|---|---|---|---|
| SVP of network security | Financial services | US | $3B | 11,000 |
| System administrator | Vehicle sales, rental, and leasing | US and Canada | $10B | 30,000 |
| CSO | Equipment rental | North America and the UK | $11B | 10,000 |
| Technical lead of cybersecurity | Insurance | Australia and New Zealand | $10B | 20,000 |
Interviewees said that before implementing Airlock Digital, their organizations had fragmented or fragile security environments and solutions that left them struggling with performance issues and working with brittle systems that required extensive maintenance and could not scale with business growth. Interviewees noted how their organizations struggled with common challenges, including:
Inability to scale. The system administrator at a vehicle sales, rental, and leasing organization said: “As my company grew, the complexity of the needs of our endpoints and the software we use and applications grew, and we found that [our previous solution] was just not scalable for our environment. It wasn’t adaptable. It wasn’t flexible. It was disruptive.”
Inability to provide complete endpoint coverage. The same interviewee said: “We weren’t able to get to 100% coverage with our previous solution. It just didn’t scale well across our environment, and there were always exceptions or systems that couldn’t be brought under control.”
Complexity of the solutions in place. The technical lead of cybersecurity at an insurance organization said: “Before switching, we were juggling multiple endpoint agents and still struggling with performance and visibility. It felt like we were constantly patching holes rather than securing the environment.”
Performance issues. The same interviewee said: “Our previous solution caused significant performance degradation on endpoints, especially during updates and scans. The agent footprint was heavy, contributing to system slowdowns and user complaints.”
High maintenance requirements. The cybersecurity lead for an insurance organization said: “We did a lot of baseline load testing of all the combinations of solutions, and the Airlock deployment added negligible overhead compared to the other combinations we used, including [our previous solution].”
The interviewees searched for a solution that could:
Scale without disruption.
Provide 100% endpoint protection across Windows, Mac, and Linux operating systems.
Provide flexibility for different users and user groups across the organization.
Reduce the amount of IT effort needed to maintain the solution.
Provide a secure and efficient way to temporarily allow legitimate access to assets not previously approved, and to adapt the rule set when appropriate.
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The composite organization operates globally and has annual revenues of $10 billion. It’s the product of a merger between two entities, each with 10,000 endpoints. One of the pre-merger organizations had previously implemented an allowlisting solution in enforcement mode with a well-developed set of policies and protocols in place. The second organization was new to allowlisting.
Deployment characteristics. Prior to full deployment, the composite rolls out Airlock Digital across both 10,000-endpoint environments. The business unit with an existing allowlisting solution deploys Airlock Digital in audit mode during the technical implementation to align policies and protocols with the new standard before moving into enforcement. The second unit that is new to allowlisting begins in audit mode to develop policies and protocols and ramp users into the allowlisting model before enforcement.
$10 billion revenue
20,000 endpoints under enforcement
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Strengthened security | $1,632,442 | $1,632,442 | $1,632,442 | $4,897,325 | $4,059,641 |
| Btr | Improved software inventory management | $510,000 | $510,000 | $510,000 | $1,530,000 | $1,268,295 |
| Ctr | Improved SOC and IT operations | $74,610 | $74,610 | $74,610 | $223,829 | $185,543 |
| Total benefits (risk-adjusted) | $2,217,051 | $2,217,051 | $2,217,051 | $6,651,153 | $5,513,479 |
Evidence and data. Interviewees said the primary advantage of Airlock Digital is that it reduces the attack surface. They explained that by blocking everything except known-good entities, Airlock Digital’s allowlisting eliminates most zero-day exploits, unknown malware, and unauthorized access attempts. Interviewees also noted that even sophisticated attacks often fail because they rely on executing unauthorized code or communicating with external command-and-control servers. This approach provides strong protection against advanced persistent threats (APTs) that might evade traditional signature-based detection and is particularly effective against fileless malware, living-off-the-land attacks, and other evasive techniques that exploit legitimate system tools. Each interviewee said that after implementing Airlock Digital, their organization has not experienced a breach.
The system administrator at the vehicle sales, rental, and leasing organization said: “Airlock gave us full visibility and control over all 10,000 endpoints. We went from having blind spots to knowing exactly what’s running, and that’s a huge leap in security posture.”
Th SVP of network security at the financial services organization said: “Airlock helped us tighten controls across 11,000 licenses. We’ve seen a measurable drop in security incidents, and our auditors are much happier with the level of endpoint hygiene.”
The CSO at the equipment rental organization said: “Before [using] Airlock, we had visibility gaps and inconsistent enforcement. Now every endpoint is locked down, and we’ve dramatically reduced our exposure to malware and shadow IT.”
The technical lead of cybersecurity at the insurance organization said: “We’re now in full enforcement mode on over 90% of our endpoints. That means no unauthorized software can run, and we’ve eliminated a whole class of threats that used to slip through.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite has all 20,000 endpoints, and each is under enforcement with Airlock Digital.
The composite’s total risk exposure to security breaches is $3,149,000 per year.2
For the composite organization, 81% of breaches originate from external attacks targeting organizations, external attacks targeting remote environments, internal incidents, or attacks or incidents involving the external ecosystem.3
Based on this percentage and because Airlock Digital addresses 80% of those breaches for the composite, the solution reduces the organization’s overall risk of a breach by more than 25%.
The value of this benefit incorporates the full cost of a breach, including labor, direct expenses, and lost revenue while accounting for savings from breach remediation and improvements to mean time to identify (MTTI) and mean time to resolve (MTTR).
Risks. Factors that may affect the benefit of strengthened security may include the following:
The extent to which the organization keeps endpoints in enforcement mode.
The organization’s annual revenue.
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $4.1 million.
Breaches interviewees’ organizations have had since implementing Airlock Digital
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Total annual risk exposure to security breaches for the composite organization | Forrester research | $3,149,000 | $3,149,000 | $3,149,000 | |
| A2 | Percent of breaches originating from external attacks targeting organizations, external attacks targeting remote environments, internal incidents, or attacks or incidents involving the external ecosystem | Forrester research | 81% | 81% | 81% | |
| A3 | Percent of those attacks addressable with Airlock Digital | Interviews | 80% | 80% | 80% | |
| At | Strengthened security | A1*A2*A3 | $2,040,552 | $2,040,552 | $2,040,552 | |
| Risk adjustment | ↓20% | |||||
| Atr | Strengthened security (risk-adjusted) | $1,632,442 | $1,632,442 | $1,632,442 | ||
| Three-year total: $4,897,326 | Three-year present value: $4,059,641 | |||||
Evidence and data. Interviewees said the following about how Airlock Digital improved their organizations’ software inventory management:
The technical lead of cybersecurity at the insurance organization said, “We don’t actually have to do much with it day-to-day on those machines that are running in enforcement mode. … The actual effort on a daily basis would be probably less than 30 minutes just to check that everything’s going smoothly and there are no unexpected errors or blocks or anything like that. It’s pretty low-touch. If we do see something we can quickly remediate, [it’s] a couple-minute job to fix.”
The CSO at the equipment rental organization said, “We did a lot of baseline load testing of all the combinations of solutions, and the one with Airlock had negligible overhead compared to the other combinations that we used, including the incumbent.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite has one security analyst who spends about 30 minutes per day maintaining Airlock Digital.
The hourly rate for a security analyst (including overhead) is $81.
Risks. The actual benefit may vary due to the amount of times an exception must be made to allow a new permission.
Results. To account for these risks, Forrester adjusted this benefit downward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.3 million.
Weekly time security analysts need to maintain Airlock Digital
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Annual software spend on license and maintenance | Composite | $12,000,000 | $12,000,000 | $12,000,000 | |
| B2 | Percent saved from improved software inventory management | Interviews | 5% | 5% | 5% | |
| Bt | Improved software inventory management | B1*B2 | $600,000 | $600,000 | $600,000 | |
| Risk adjustment | ↓15% | |||||
| Btr | Improved software inventory management (risk-adjusted) | $510,000 | $510,000 | $510,000 | ||
| Three-year total: $1,530,000 | Three-year present value: $1,268,295 | |||||
Evidence and data. Interviewees reported an unexpected benefit during the initial audit phase of Airlock Digital’s deployment. When reviewing the logs of applications running on the network, IT managers found licensed applications that were never executed, as well as duplicate applications serving the same function in different departments. By eliminating idle tools and consolidating overlapping ones, the organizations reduced software licensing costs and associated maintenance overhead.
The technical lead of cybersecurity at the insurance organization said: “We can see exactly what’s running on every endpoint. That level of visibility just wasn’t possible before.”
The SVP of network security at the financial services organization said: “We now have a real-time view of what’s running across the network. That’s helped us catch unauthorized applications and tighten our controls.”
The system administrator at the vehicle, sales rental and leasing organization said: “Airlock gave us full visibility and control over all 10,000 endpoints. We went from having blind spots to knowing exactly what’s running.”
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite previously spent $12 million on software licenses and management each year.
The composite reduces that spend by 5% beginning in Year 1.
The composite continues to monitor its software inventory through Airlock Digital logs to prevent redundant installations and eliminate applications that are no longer needed through in Years 2 and 3.
Risks. The actual benefit may vary due to:
The amount the organization spends on software licenses.
The extent to which the organization has already implemented an allowlisting solution.
Results. To account for these risks, Forrester adjusted this benefit downward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $186,000.
Software cost reduction
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Time saved on maintenance (hours) | Interviews | 520 | 520 | 520 | |
| C2 | Average fully loaded hourly cost of a security analyst | Composite | $81 | $81 | $81 | |
| C3 | Operational efficiency from reduced solution maintenance | C1*C2 | $42,120 | $42,120 | $42,120 | |
| C4 | Application support analysts | Composite | 10 | 10 | 10 | |
| C5 | Percent of reduced application management time from improved software inventory management | Interviews | 5% | 5% | 5% | |
| C6 | Time saved on application management (hours) | C4*C5*2,080 | 1,040 | 1,040 | 1,040 | |
| C7 | Average fully loaded hourly cost of an application support analyst | Composite | $65 | $65 | $65 | |
| C8 | Operational efficiency from improved software inventory | C6*C7 | $67,600 | $67,600 | $67,600 | |
| C9 | Productivity recapture | Research data | 80% | 80% | 80% | |
| Ct | Improved SOC and IT operations | (C3+C8)*C9 | $87,776 | $87,776 | $87,776 | |
| Risk adjustment | ↓15% | |||||
| Ctr | Improved SOC and IT operations (risk-adjusted) | $74,610 | $74,610 | $74,610 | ||
| Three-year total: $223,830 | Three-year present value: $185,543 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
Enterprisewide user productivity improvements. Interviewees explained that fewer outages mean fewer work disruptions and noted that Airlock Digital enforces application control without introducing latency or blocking legitimate work.
On-demand exceptions and transparent logging. The assurance that users could swiftly request a one-time pass to run previously unapproved applications when necessary enabled teams adopt a deny-by-default posture without disrupting productivity. In addition to flexible exception handling, Airlock’s logging capabilities were highlighted as a major benefit. These detailed, customizable logs helped IT teams monitor and audit exception periods by user or event type, simplifying oversight and reducing administrative burden.
The ability to customize the solution by user group. Interviewees emphasized that Airlock Digital provides flexibility to tailor application control policies to specific user groups. They said this capability goes beyond general security improvements and demonstrates granular control over application access. This group-level customization made it easier for their organizations to adopt a deny-by-default posture without disrupting workflows. By segmenting users based on their operational needs, teams could enforce strict controls while still supporting flexibility for developers, power users, or other exception groups.
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Dtr | Enterprise license fees | $0 | $500,000 | $500,000 | $500,000 | $1,500,000 | $1,243,426 |
| Etr | Technical implementation and maintenance | $3,888 | $244 | $244 | $244 | $4,624 | $4,494 |
| Ftr | Policy and protocol development | $421,848 | $0 | $0 | $0 | $421,848 | $421,848 |
| Total costs (risk-adjusted) | $425,740 | $500,244 | $500,244 | $500,244 | $1,926,467 | $1,669,768 |
Evidence and data. Interviewees reported their organizations pay enterprise license fees based on the number of endpoints under protection.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
The composite has a total of 20,000 endpoints under Airlock Digital enforcement.
The composite’s license fees are $25 per endpoint per year.
Risks. Forrester applies no risk adjustment to this cost.
Results. Enterprise License Fees for the composite amount to a three-year total PV (discounted at 10%) of $1.2 million.
License fee per endpoint per year
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| D1 | Airlock license fee per endpoint | Airlock Digital | $0 | $25 | $25 | $25 |
| D2 | Total endpoints | Composite | 0 | 20,000 | 20,000 | 20,000 |
| Dt | Enterprise license fees | D1*D2 | $0 | $500,000 | $500,000 | $500,000 |
| Risk adjustment | 0% | |||||
| Dtr | Enterprise license fees (risk-adjusted) | $0 | $500,000 | $500,000 | $500,000 | |
| Three-year total: $1,500,000 | Three-year present value: $1,243,426 | |||||
Evidence and data. Interviewees reported that technical implementation was very straightforward, and there were no significant complications or challenges. The technical lead of cybersecurity for the insurance organization said: “Once we had the initial policy built, we could have rolled out Airlock across the Zero Trust laptop fleet in a single day if we wanted to be aggressive. The actual build took about two weeks, but the deployment itself was fast and straightforward.”
Modeling and assumptions. Based on the interviews, Forrester assumes the composite organization requires 40 hours of effort from one security analyst to deploy Airlock Digital.
Risks. This cost may vary due to:
The time the organization spends on technical implementation.
The average hourly wage (including overhead) of a security analyst.
Results. To account for these risks, Forrester adjusted this cost upward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $35,000.
3-year NPV of technical implementation and maintenance cost
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| E1 | Average fully loaded hourly cost of a security analyst | Composite | $81 | $81 | $81 | $81 |
| E2 | Security analyst time to configure (hours) | Composite | 40 | 0 | 0 | 0 |
| E3 | Security analyst time to maintain and monitor (hours) | Composite | 0 | 130 | 130 | 130 |
| Et | Technical implementation and maintenance | E1*(E2+E3) | $3,240 | $10,530 | $10,530 | 10,530 |
| Risk adjustment | ↑20% | |||||
| Etr | Technical implementation and maintenance (risk-adjusted) | $3,888 | $12,636 | $12,636 | $12,636 | |
| Three-year total: $41,796 | Three-year present value: $35,312 | |||||
Evidence and data. Interviewees indicated that before implementing Airlock Digital, their organizations spent approximately 12 weeks in Audit mode to define the policies and protocols that would govern Enforcement mode.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
A team of two managers and three security analysts work on policy and protocol development.
The fully loaded hourly cost of a manager is $111.
The fully loaded hourly cost of a security analyst is $81.
The composite runs Airlock Digital in Audit mode for one full quarter before switching to Enforcement mode.
After the Audit phase, the composite handles all additional policy and protocol development as a part of regular maintenance.
Risks. This cost may vary due to:
The number of team members assigned to policy and protocol development.
The average hourly wage (including overhead) of a security analyst.
The average hourly wage (including overhead) of a manager.
The time needed to develop policies and protocols.
Results. This yields a three-year total PV of $422,000.
3-year NPV cost of policy and protocol development
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| F1 | Time to enforcement status (weeks) | Composite | 12 | |||
| F2 | Average fully loaded hourly cost of a team member | Composite | $93 | |||
| F3 | Weekly time spent developing policies and protocols (hours) | Composite | 30 | |||
| F4 | Team members | Composite | 12 | |||
| Ft | Policy and protocol development | F1*F2*F3*F4 | $401,760 | $0 | $0 | $0 |
| Risk adjustment | ↑5% | |||||
| Ftr | Policy and protocol development (risk-adjusted) | $421,848 | $0 | $0 | $0 | |
| Three-year total: $421,848 | Three-year present value: $421,848 | |||||
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($425,736) | ($512,636) | ($512,636) | ($512,636) | ($1,963,644) | ($1,700,586) |
| Total benefits | $0 | $2,217,051 | $2,217,074 | $2,217,074 | $6,651,222 | $5,513,479 |
| Net benefits | ($425,736) | $1,704,415 | $1,704,145 | $1,794,145 | $4,687,510 | $3,812,893 |
| ROI | 224% |
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, and NPV for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI and NPV values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in Airlock Digital.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Airlock Digital can have on an organization.
Interviewed Airlock Digital stakeholders and Forrester analysts to gather data relative to Airlock Digital.
Interviewed four decision-makers at organizations using Airlock Digital to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.
Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The present or current value of (discounted) cost and benefit estimates given at an interest rate (the discount rate). The PV of costs and benefits feed into the total NPV of cash flows.
The present or current value of (discounted) future net cash flows given an interest rate (the discount rate). A positive project NPV normally indicates that the investment should be made unless other projects have higher NPVs.
A project’s expected return in percentage terms. ROI is calculated by dividing net benefits (benefits less costs) by costs.
The interest rate used in cash flow analysis to take into account the time value of money. Organizations typically use discount rates between 8% and 16%.
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
1 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
2 Cumulative breach costs are computed using the composite organization’s size (revenue or number of employees) as an input to a regression analysis of reported total cumulative costs for all breaches for organizations that experienced at least one breach in the past 12 months. Source: Forrester’s Security Survey, 2025, “Using your best estimate, what was the total cumulative cost of all breaches experienced by your organization in the past 12 months?” Base: 1,740 global security decision-makers whose organization has experienced a breach in the past 12 months. The cumulative breach cost is then multiplied by a 67% likelihood for organizations to experience one or more breaches in a given year. Source: Forrester's Security Survey, 2025, “How many times do you estimate that your organization’s sensitive data was potentially compromised or breached in the past 12 months?” Base: 2,643 global security decision-makers.
3 Percent of breaches by primary attack vector, as reported by security decision-makers whose organizations experienced at least one breach in the last 12 months. Source: Forrester’s Security Survey, 2025, “Of the times that your organization’s sensitive data was potentially compromised or breached in the past 12 months, please indicate how many of each fall into the categories below.” Base: 1,766 global security decision-makers who have experienced a breach in the past 12 months.
Readers should be aware of the following:
This study is commissioned by Airlock Digital and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Airlock Digital. For any interactive functionality, the intent is for the questions to solicit inputs specific to a prospect's business. Forrester believes that this analysis is representative of what companies may achieve with Airlock Digital based on the inputs provided and any assumptions made. Forrester does not endorse Airlock Digital or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, Airlock Digital and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided ‘AS IS,’ and Forrester and Airlock Digital make no warranties of any kind.
Airlock Digital reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
Airlock Digital provided the customer names for the interviews but did not participate in the interviews.
Mary Barton
November 2025
https://mainstayadvisor.com/go/mainstay/gdpr/policy.html