Total Economic Impact

The Total Economic Impact™ Of Chainguard Containers

Cost Savings And Business Benefits Enabled By Chainguard Containers

A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY Chainguard, January 2026

[CONTENT]

Total Economic Impact

The Total Economic Impact™ Of Chainguard Containers

Cost Savings And Business Benefits Enabled By Chainguard Containers

A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY Chainguard, January 2026

Forrester Print Hero Background
M
K
[CONTENT]
[CONTENT]

Executive Summary

Research estimates that 77% of an enterprise’s codebase now comes directly from open source as opposed to proprietary development.1 As open source software grows in adoption and ubiquity, organizations face new operational challenges and security risks. Organizations are contending with an escalating volume and sophistication of software supply chain attacks, which has increased regulatory pressure to manage this attack surface and mitigate risks. This reality has increased the overhead, complexity, and toil for engineering teams, redirecting resources from building software to patching and maintaining it. In this context, advanced container security platforms help enterprises better manage open source dependencies, surface risks, and maintain more secure software ecosystems.

Chainguard is a software supply chain security company that provides a family of minimal, hardened, and continuously updated software artifacts — including container images — designed to reduce vulnerabilities and simplify maintenance. Chainguard’s secure-by-default artifacts automate image upkeep and vulnerability remediation, reducing the manual patching and compliance overhead associated with frameworks like FedRAMP, PCI DSS, CMMC, and more. These capabilities can help organizations strengthen their software supply chain security while reducing the operational toil that pulls developers away from building software.

Chainguard commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Chainguard Containers.2 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Chainguard Containers on their organizations.

233%

Return on investment (ROI)

 

$1.8M

Net present value (NPV)

 

To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed eight decision-makers from six organizations with experience using the Chainguard Containers solution. For the purposes of this study, Forrester aggregated the experiences of the interviewees and combined the results into a single composite organization, which is a global software-focused organization with $250 million in annual revenue and 1,000 employees.

Interviewees said that prior to using Chainguard Containers, their organizations relied on fragmented manual vulnerability management processes and ad hoc patching by siloed teams against their container images. Prior attempts to improve these environments yielded limited success, leaving teams with inconsistent security practices, high remediation costs in the form of engineering time, and constant firefighting between security and development teams. These limitations led to mounting technical debt, delayed feature releases, compliance risks, and strained customer relationships due to the inability to meet strict vulnerability and regulatory requirements.

Interviewees said transitioning to Chainguard Containers represented a strategic shift for their organizations and allowed them to move from reactive manual security practices to proactive, automated, and scalable container security. Key results from the investment include reduced vulnerabilities, reduced development and engineering effort, increased speed to delivery, and additional profit.

Key Findings

Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:

  • A 90% reduction in development and security engineering effort for vulnerability tracking and remediation. With Chainguard Containers, the composite reduces its manual patching workload due to automation, hardened images, and proactive security practices, which lowers its vulnerability management efforts for base images. Per year, the reduction in development and engineering capacity dedicated to vulnerability management is $350,000. Over three years, the reduction in development and security engineering effort is worth $871,000 to the composite organization.

  • A 90% reduction in vulnerabilities. The reduction of vulnerabilities in container images and application environments decreases the composite’s likelihood of security incidents, breaches, and exposure to software supply chain threats, resulting in avoided costs related to incident response efforts, regulatory penalties and fines, customer churn, and disruption to business operations. For the composite, this represents $153,000 per year in avoided costs. Over three years, the reduction in vulnerabilities is worth $380,000 to the composite organization.

  • A 5% increase in new business revenue from customers in highly regulated industries. With Chainguard Containers, the composite organization meets the compliance and security expectations of customers in heavily regulated industries (e.g., finance, healthcare, government). For the composite, serving these customers leads to $240,000 per year in additional revenue. Over three years, this yields a profit impact of $597,000 for the composite organization.

  • A 50% reduction in off-cycle release work and ad hoc engineering effort. The composite adds automation to its rebuild process as Chainguard Containers provides secure, patched container images. Fixes are backported without introducing new versions. For the composite, the additional developer capacity to ship new products, platforms, and features generates $260,000 per year. Over three years, reduced rebuild time and increased speed to delivery is worth $670,000 to the organization.

Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:

  • Improved collaboration between security and developer operations. By providing a centralized and automated approach, Chainguard’s container solution helps reduce friction between security and developer teams for the composite organization and supports closer collaboration on shared goals such as feature releases and strategic initiatives.

  • Improved employee satisfaction and developer experience. With fewer vulnerabilities to address and less remediation work, engineers at the composite organization report reduced frustration and an improved ability to focus on higher-value work.

Costs. Three-year, risk-adjusted PV costs for the composite organization include:

  • Chainguard subscription. After a proof of concept and pilot phase, the composite begins using Chainguard images. Each year, the cost of a Chainguard subscription — including the product subscription, customer success support, and professional services — is $220,000 per year for the composite organization. Over three years, the composite incurs $619,000 in Chainguard subscription costs.

  • Implementation and ongoing management. The composite organization dedicates two weeks (80 hours) of migration effort per base image to move from existing images, along with 80 engineering hours annually for ongoing management. Over three years, the composite organization invests $128,000 in implementation and ongoing management.

  • Change management and training. The composite dedicates one hour per engineer to training related to Chainguard Containers and provides engineers with documentation and recordings. Over three years, training and change management costs total $9,000 for the composite organization.

The financial analysis that is based on the interviews found that a composite organization experiences benefits of $2.5 million over three years versus costs of $756,000, adding up to a net present value (NPV) of $1.8 million and an ROI of 233%.

“We use Chainguard Containers so that we can actually build and solve healthcare issues and not worry about the infrastructure image and vulnerability issues.”

Vice president of cloud platform engineering, healthcare

Key Statistics

233%

Return on investment (ROI) 

$2.5M

Benefits PV 

$1.8M

Net present value (NPV) 

<6 months

Payback 

Benefits (Three-Year)

[CHART DIV CONTAINER]
Reduced development and security engineering effort Reduced vulnerabilities Additional profit Developer hours freed for innovation due to faster builds

The Chainguard Containers Customer Journey

Drivers leading to the Chainguard Containers investment
Interviews
Role Industry Employees Revenue
Engineering manager Software 550 $60M
Senior software engineer Manufacturing 4,000 $2B
Chief architect, enterprise

Application security product lead
Software 67,000 $20B
Senior director of product security Energy 75,000 $35B
Senior manager of developer platform Transportation 130,000 $54B
Vice president of application hosting and automation

Vice president of cloud platform engineering
Healthcare 310,000 $253B
       
Key Challenges

Interviewees said that before using Chainguard Containers, their organizations faced mounting pressure to secure their software supply chains, but legacy approaches were fragmented and labor-intensive. Interviewees described manual scanning and a lack of centralization that created team-by-team responsibility, no automation, and high labor costs that inhibited remediation and left gaping compliance gaps. The lack of centralized container security further meant that vulnerability management was inconsistent and a drain on engineering resources while regulatory demands and customer expectations for demonstrable security practices compounded these difficulties.

Interviewees noted how their organizations struggled with common challenges, including:

  • Manual, fragmented vulnerability management. Some of the interviewees said that before using Chainguard Containers, their organization did not have sufficient resources to remediate all vulnerabilities. Those organizations that did have some capacity were only able to address small percentage of vulnerabilities outstanding in their environments given the time required for remediation, so they relied on ad hoc manual processes to analyze, triage, and remediate vulnerabilities in container images. But this created inefficiencies, duplicated effort, and persistent risk as teams struggled to keep pace with the volume and complexity of vulnerabilities.

    The application security product lead in the software industry said: “Before Chainguard Containers, we didn’t have much of our security processes in place. It was not done at scale.” Interviewees explained that their organizations used public open-source container images with little governance or lifecycle management and said these containers were often neglected and only addressed reactively — typically after a major incident or customer pressure.

  • A growing number of vulnerabilities with existing resources. Interviewees said that before using Chainguard Containers, development teams at their organizations viewed security as a burden; there was little motivation to address vulnerabilities because efforts rarely made a dent in the number of vulnerabilities and amount of corresponding risk. The senior director of product security in the energy sector said: “I saw some product teams were not addressing alerts from security because the value was not there. I work on these issues, but I still have some issues left. So then what’s the point of me working on these issues? With Chainguard Containers, the motivation was much higher to do it correctly, so that caused the big ripple effect on us.”

  • Friction between security and developer teams. Interviewees said that before using Chainguard Containers, there was palpable friction between security and application teams regarding vulnerability management. When application teams spent time addressing vulnerabilities, there uncertainty remained about which vulnerabilities should be remediated or who was responsible for remediation. Security and DevOps teams operated in silos, and each had separate responsibilities and often conflicting priorities. Security was often seen as a blocker or an afterthought, with developers frustrated by the lack of effective tools and security teams frustrated by lack of adoption.

  • High cost and effort of remediation. The manual nature of vulnerability management translated directly into high labor costs and operational inefficiency. Security and engineering teams spent time on tasks that could otherwise be automated, and the financial impact ran into millions of dollars annually. The senior director of product security in the energy sector estimated their organization’s annual internal cost to manage container vulnerabilities without Chainguard would be $2.4 million. They also said tackling all vulnerabilities was difficult due to the number of containers, the average number of vulnerabilities per container at a time, the estimated time to remediate each vulnerability, the cost of labor for remediation, and the fact that this effort would be ongoing as new vulnerabilities are discovered.

    The senior software engineer in the manufacturing sector said their organization had projects on both Chainguard Containers and in the legacy environment and compared the differences: “Engineers have spent the last several months doing [almost] nothing but vulnerability remediation on the projects that didn’t use Chainguard Containers. It’s quite the [time] investment they wouldn’t have [needed to make] if these projects were running on Chainguard images.”

  • Compliance and customer pressure. Interviewees in highly regulated industries said that to satisfy customers’ security requirements, their organizations were increasingly compelled to meet strict regulatory standards like Federal Risk and Authorization Management Program (FedRAMP), Payment Card Industry Data Security Standard (PCI DSS), Cybersecurity Maturity Model Certification (CMMC), and HIPAA. Audits and RFPs often exposed gaps in existing processes, which made it clear that legacy approaches were insufficient for modern risk environments and for addressing customer concerns.

    The senior software engineer in the manufacturing industry said: “We were tasked with building a federally compliant implementation of our platform, and with that comes a lot of the complexities and strict requirements around FedRAMP. Images off the general internet when scanned are going to yield hundreds — if not thousands — of vulnerabilities.” The engineering manager in the software industry said, “We had a customer that had a very strict vulnerability policy, and when we were evaluating both an alternative third-party solution and Chainguard Containers, the reality was that the alternate solution was not able to reduce the amount of vulnerabilities as much as Chainguard.”

    The application security product lead in the software industry described an organizationwide effort to comply with customer expectations. The interviewee noted: “We were audited by a third-party vendor. So, it was part of an audit initiative that security needs to be a highlight for the company. That’s how [our use of Chainguard] came about.”

 Spotlight On Scalability

Avoided Internal Effort Costs

Interviewees said that without Chainguard Containers, building an internal solution or process for hardened container images and vulnerability management would have required a substantial and often prohibitive investment in labor. The senior director of product security in the energy sector said they calculated what this would cost their organization without Chainguard Containers: “The end number was about $2.4 million, and that’s just for one year. This requires continuous management. … Initially we were doing like five to six images. There is no way we could [create] a team to build and support 160 images. There is no way it would possible.”

The engineering manager in the software industry said that building an internal solution for hardened container images and vulnerability management would very difficult and costly: “It [would be] somewhere between not possible and more [expensive] than I would be able to calculate. Chainguard is literally building these images from their own base OS. We’d have to essentially rebuild what Chainguard did to really meet the CVE (common vulnerabilities and exposures) like posture that we needed to meet. We’d have probably needed to hire a team of at least five full-time engineers just to maintain that.”

Several interviewees echoed that building internally would either be infeasible or require a specialized team the company would not be able to justify, and some concluded the initiative would require significant investments in both infrastructure and ongoing maintenance. The senior director of product security in the energy sector said: “I think the biggest thing to weigh when considering Chainguard Containers is the cost of trying to do it yourself, including recreating the peace of mind Chainguard gives you. The number one volumetric vulnerability to a software product is its open-source software, and 100% of containers are open-source software. So, on a monthly basis, if you were to look at your vulnerabilities by count, attribute to the percentage those from your containers, and then estimate the cost, it would be very expensive. But if a company is going to solve the problem, it’s going to cost more to do in-house unless it’s a small company. So, at scale, it’s much cheaper to have Chainguard accountable for it.”

The chief architect of enterprise in the software industry said: “If we were doing it ourselves at the scale the company is playing at now, it would have [required] about three to four FTEs. Before Chainguard Containers, we were maintaining it with one FTE, but the number [of vulnerabilities] never went to zero. To reduce that [number] to zero would [require] around two to three FTEs who have to be maintained. That’s not our value proposition. We provide solutions for human resource management, not container security. We don’t want to be in that space, and it’s not worth pulling governance together with a team of five in-house.”

Interviewees estimated that building internally would require teams ranging from three to 20 FTEs for months at a time and millions of dollars in annual labor and technology costs. The opportunity costs — including lost contracts, risk avoidance, and the inability to meet customer or regulatory requirements — would also be significant and, in some cases, they would dwarf the direct costs of building.

Why Chainguard Containers?

Interviewees said their organizations were looking for a solution that is technically robust and operationally efficient, and they said Chainguard’s hardened images, automation, and support model offer a step-change improvement over their legacy practices and competing products. They explained that the following factors led to the investment.

  • Validated security approach. Each interviewee emphasized the importance of validating that Chainguard could meet their security and operational requirements before full adoption. To ensure the solution aligned with their expectations, the organizations conducted either a proof of concept or a monthlong pilot. The application security product lead in the software industry said, “It was a complete open discussion as we rolled it out to our developer community.” Interviewees said the pilots helped them understand how the solution fits within their existing workflows, confirm its approach to vulnerability management, and assess vendor responsiveness and support before committing to broader use.  

  • Ease of adoption and automation. Interviewees said that ease of integration and automation were important considerations when selecting a solution. Their organizations were looking for a tool their teams could adopt without major workflow disruption and with clear guidance to support onboarding. The engineering manager in the software industry said: “The documentation was clear to the point where execution would be very easy. ... We [realized we would be] able to set up a process very quickly within a couple hours so that our developers could leverage images immediately.” The application security product lead in the software industry similarly emphasized the importance of straightforward adoption and ongoing maintenance, noting their preference for a solution with automated update processes.

  • Credibility, support, and scalability. Interviewees said vendor credibility, responsive support, and the ability to operate at enterprise scale were important factors in their organizations’ selection processes. Several highlighted the value of working with a provider recognized in the market and trusted in regulated industries or public sector environments. The senior director of product security in the energy sector remarked, “Chainguard for me was the just obvious choice because they created this category.” The vice president of cloud platform engineering in the healthcare added that Chainguard’s maturity and certifications aligned with their organization’s requirements: “They had a lot of images, which we wanted, and then they’re also one of the [providers certified by the Department of Defense]. We operate in the public sector, so that was one of the very attractive reasons we went with Chainguard.”

Investment Objectives

The interviewees’ organizations searched for a solution that could:

  • Reduce risk exposure and allow them to meet compliance requirements.

  • Automate vulnerability management to streamline labor efficiencies.

  • Allow engineering resources to focus on higher-value work (e.g., feature development, innovation).

  • Create business growth by fortifying customer trust.

“If we didn’t have Chainguard to meet requirements, [one customer in a highly regulated industry] just wouldn’t give us their business.”

Senior software engineer, manufacturing

“We are using Chainguard Containers so that our engineers can focus on delivering the right business and outcomes with less cost and less concern about the security outcomes in the future.”

Senior manager of developer platform, transportation

Composite Organization

Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:

  • Description of composite. The globally software-focused organization generates $250 million in annual revenue and has 1,000 employees and 100 engineers across its DevOps, SecOps, and development teams.

  • Deployment characteristics. During a monthlong pilot phase, the composite organization begins to use Chainguard’s images, starting with a handful of images during the initial phase. It adds all projects to Chainguard Containers by Year 1.

 KEY ASSUMPTIONS

  • $250 million revenue

  • Global operations

  • 1,000 employees

  • 100 engineers across DevOps, SecOps, and development

Analysis Of Benefits

Quantified benefit data as applied to the composite
Total Benefits
Ref. Benefit Year 1 Year 2 Year 3 Total Present Value
Atr Reduced development and security engineering effort $350,064 $350,064 $350,064 $1,050,192 $870,557
Btr Reduced vulnerabilities $152,757 $152,757 $152,757 $458,271 $379,884
Ctr Contracts enabled through improved compliance $240,000 $240,000 $240,000 $720,000 $596,844
Dtr Developer time savings due to faster builds $269,280 $269,280 $269,280 $807,840 $669,660
  Total benefits (risk-adjusted) $1,012,101 $1,012,101 $1,012,101 $3,036,303 $2,516,945
Reduced Development And Security Engineering Effort

Evidence and data. Interviewees said that before using Chainguard Containers, their organizations had little to no capacity to remediate tracked vulnerabilities, and some noted their company didn’t have a standard process for remediation at all. Teams that dedicated a small portion of their time to remediation did so based on prioritization, preferring to focus on more strategic work. The director of product security in the energy sector said, “Before Chainguard Containers, we just had bad governance when it came to container security. Occasionally, if a really serious vulnerability was tracked, we would shift some focus on it, but otherwise there was just not good container lifecycle management.” They said team members who dedicated even 10% of their time to remediation described the effort as a strain on resources.

Interviewees explained that when time constraints prevent a full rebuild, patching may be used as a stopgap and said that enterprises can lend resources to remediation if necessary. But they noted smaller teams or organizations may lack the capacity to rebuild and instead use patching as a temporary solution. Interviewees said that with Chainguard’s automation and hardened images, their organizations reduced development and security engineering effort and shifted from manual, reactive remediation to proactive, scalable security practices.

  • The vice president of platform engineering in healthcare noted that development teams were heavily burdened by vulnerability tracking and remediation. They said “maybe 10%” of the development efforts were going into addressing vulnerability remediation, but that the effort required for vulnerability management dropped to zero — especially for base images — with Chainguard Containers: “Now we pretty much don’t spend any time at all [on base image vulnerabilities]. The time we continue to spend is on the application teams putting their own open-source application components that we still need to continue to support on top of those base images.”

  • The engineering manager in the software industry reported that their organization’s DevOps and developer teams previously spent manual effort on vulnerability remediation — especially for public sector releases. They estimated that for each release, about three engineering days were spent on vulnerability remediation for third-party open-source applications and developer teams spent about 10 engineer-days fixing vulnerabilities in internal applications deployed via base images. The engineering manager said that Chainguard Containers helped reduce this effort to about 1 to 2 hours per release for DevOps teams using third-party open source apps and to about two days for developer teams deploying services on base images.

  • The application security product lead in the software industry noted that after their organization’s Chainguard deployment, teams reduced vulnerabilities to zero with “just two lines of code and regression testing.”

  • Interviewees said the combination of Chainguard’s hardened and continuously patched base images, automated updates, and vendor-managed vulnerability remediation eliminated the need for manual patching, allowing teams to shift focus from ongoing security maintenance to higher-value tasks.

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • Before using Chainguard Containers, 100 engineers spent 5% of their time on vulnerability tracking and remediation.

  • With Chainguard Containers, the engineers reduce tracking and remediation time by 90%.

  • The average hourly burdened rate for a highly technical senior engineer is $88.

Risks. The impact of this benefit will vary among organizations based on the following factors:

  • The total open-source application security effort required in the prior environment.

  • The percentage of projects that use Chainguard Containers and the scale of the deployment.

  • The size and scope of applications and dedicated developer, DevOps, and security teams.

Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $871,000.

90%

Reduction in engineering time required for vulnerability tracking and remediation

“With Chainguard Containers, we just continuously pull the latest base container images. You don’t have to do any reviews, and Chainguard is doing all the analysis.”

Senior director of product security, energy

Reduced Development And Security Engineering Effort
Ref. Metric Source Year 1 Year 2 Year 3
A1 Total DevOps, developers, and security engineers Composite 100 100 100
A2 Percentage of engineering time spent on vulnerability tracking and remediation before Chainguard Containers Interviews 5% 5% 5%
A3 Total time dedicated to vulnerability and remediation tracking in the prior environment (hours) A1*A2*2,080 10,400 10,400 10,400
A4 Percentage reduction of time dedicated to vulnerability and remediation tracking with Chainguard Containers Interviews 90% 90% 90%
A5 Average fully burdened hourly salary for an engineer Composite $88 $88 $88
A6 Productivity recapture rate TEI methodology 50% 50% 50%
At Reduced development and security engineering effort A3*A4*A5*A6 $411,840 $411,840 $411,840
  Risk adjustment 15%      
Atr Reduced development and security engineering effort (risk-adjusted)   $350,064 $350,064 $350,064
Three-year total: $1,050,192 Three-year present value: $870,557
Reduced Vulnerabilities

Evidence and data. Each interviewee described a notable decrease in the number of vulnerabilities present in container images and application environments with Chainguard Containers. Those from organizations that previously struggled with hundreds or thousands of vulnerabilities said Chainguard’s hardened, continuously updated images enabled their companies to reduce the number of vulnerabilities by between 70% and 90%. Some noted the number reduced to nearly zero.

  • The senior director of product security in the energy sector said their organization decreased its number of vulnerabilities from 30,000 to effectively zero and noted that this exceeded results from the initial proof of value phase. The vice president of cloud platform engineering in healthcare echoed this, stating, “Overall, we were able to reduce about 70% to 80% of vulnerabilities across the enterprise.”

  • The senior manager of developer platform in the transportation industry said: “Chainguard Containers remediated upwards to 80% to 90% of teams’ vulnerabilities in the base layer. The practical effect was a reduction from upwards of 700 vulnerabilities per team to single digits after adopting Chainguard images.”

  • The engineering manager in the software industry reported, “Our vulnerability count dropped from roughly 500 to 1000 vulnerabilities down to around 50 after integrating Chainguard Containers, even without the most recent codebase updates.”

  • The application security product lead in the software industry said Chainguard Containers eliminated 80% of severe issues, and they estimated a reduction of 350,000 issues in the past year.

  • Several interviewees explicitly linked the reduction in vulnerabilities to a lower likelihood of security incidents or breaches. The senior director of product security in the energy sector stated: “We had previously unsurmountable risk in our containers that was completely outside of our jurisdiction. We couldn’t get on top of it, and now we just don’t have that. Chainguard Containers reduced it by 80% for both exposure to software supply chain vulnerabilities and breach likelihood.”

  • The vice president of cloud platform engineering in healthcare noted, “Chainguard Containers reduced the risk for our applications — including the risk of data loss and zero-day [attacks] — because we never know who is out there.”

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite organization’s total risk exposure is $1,678,000.3

  • For the composite, 17% of breaches are due to external attacks from software vulnerability exploit, software supply chain breach, or web application exploit.4

  • Seventy percent of the composite’s application code is open source.5

  • Chainguard Containers reduce the composite organization’s vulnerabilities by 90%.

Risks. The impact of this benefit will vary among organizations based on the following factors:

  • The organization’s size, industry, and operations.

  • The percentage of the organization’s open-source application code and container use.

  • The scale of the organization’s Chainguard container deployment.

Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $380,000.

90%

Reduction in vulnerabilities

“We went from 30,000 vulnerabilities to effectively zero.”

Senior director of product security, energy

Reduced Vulnerabilities
Ref. Metric Source Year 1 Year 2 Year 3
B1 Total risk exposure Forrester research $1,678,000 $1,678,000 $1,678,000
B2 Percentage of breaches due to external attacks from software vulnerability exploit, software supply chain breach, or web application exploit Forrester research 17% 17% 17%
B3 Percentage of application code that is open source Research data 70% 70% 70%
B4 Risk exposure addressable with Chainguard Containers B1*B2*B3 $199,682 $199,682 $199,682
B5 Reduction in vulnerabilities with Chainguard containters Interviews 90% 90% 90%
Bt Reduced vulnerabilities B4*B5 $179,714 $179,714 $179,714
  Risk adjustment 15%      
Btr Reduced vulnerabilities (risk-adjusted)   $152,757 $152,757 $152,757
Three-year total: $458,271 Three-year present value: $379,884
Contracts Enabled Through Improved Compliance

Evidence and data. Interviewees from organizations serving highly regulated or competitive industries in which security and compliance are non-negotiable for clients said the shift to Chainguard Containers was especially crucial. The senior software engineer in manufacturing explained: “We were tasked with building a federally compliant implementation of our platform, and with that comes a lot of the complexities and strict requirements around FedRAMP. Images off the general internet when scanned will yield hundreds if not thousands of vulnerabilities.” The senior manager of developer platform in the transportation industry said their organization needs to comply with PCI DSS, and the engineering manager in the software industry referenced Risk Management Framework (RMF) and Authorization to Operate (ATO) as requirements for deploying in military and public sector environments.

  • The senior software engineer in manufacturing noted that due to compliance requirements, securing federal contracts would not have been possible without Chainguard Containers and said it possible for their organization to obtain one federal contract worth $20 million.

  • The senior director of product security in the energy sector explained that Chainguard Containers enabled their company to meet customer requirements that would have otherwise blocked product launches or delayed contracts: “We had a customer that would not put our software into production until we addressed these issues. They had a deadline and they discovered all the vulnerabilities that they could not allow. By implementing Chainguard Containers, were able to address all of the vulnerabilities in one fell swoop. The cost of that delayed contract with concessions we would have had to make would probably have been $5 million for just this one customer. So, without Chainguard Containers, even just one customer engagement would have had a tangible loss of concessions in one contract.”

  • The same interviewee mentioned a different contract that was in danger of termination unless vulnerabilities could be addressed. They said: “The customer was just at the end of their rope with us trying to burn down the vulnerabilities. It came to the point that we signed with Chainguard and named it in our solution process. So we actually named the vendor as the value proposition in our ability to meet the demands of the customer.”

  • The engineering manager in the software industry described winning a $2 million per year contract with the potential to expand to $20 million per year because Chainguard container enabled their organization to meet a customer’s strict vulnerability requirements. The interviewee estimated that 30% to 40% of the organization’s revenue currently depends on meeting vulnerability-related requirements that Chainguard enables, and they noted this share could grow to as much as 70% to 80% as more customers adopt stricter security standards.

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite’s annual revenue $250 million.

  • Twenty percent of the composite’s annual revenue is from new business.

  • Due to industry compliance regulations, 5% of the composite’s new business or expanding business is at risk without Chainguard.

  • The composite’s operating profit margin is 12%.

Risks. The impact of this benefit will vary among organizations based on the following factors:

  • The organization’s revenue and its percentage of retained versus new business.

  • The percentage of the organization’s revenue streams from highly regulated industries and the potential to expand in these sectors.

  • The organization’s industry.

  • The organization’s profit margin.

Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $597,000.

$2.5M

Annual revenue won from contracts with customers in highly regulated industries

“We wouldn’t have been able to deploy our software into those highly regulated environments to win and retain those customer contracts without the Chainguard vulnerability management systems.”

Engineering manager, software

Contracts Enabled Through Improved Compliance
Ref. Metric Source Year 1 Year 2 Year 3
C1 Revenue Composite $250,000,000 $250,000,000 $250,000,000
C2 Percentage of revenue from new business Composite 20% 20% 20%
C3 Percentage of new business from contracts at risk without Chainguard Interviews 5% 5% 5%
C4 Revenue won due to Chainguard from contracts with customers in highly regulated industries C1*C2*C3 $2,500,000 $2,500,000 $2,500,000
C5 Operating profit margin Composite 12% 12% 12%
Ct Contracts enabled through improved compliance C4*C5 $300,000 $300,000 $300,000
  Risk adjustment 20%      
Ctr Contracts enabled through improved compliance (risk-adjusted)   $240,000 $240,000 $240,000
Three-year total: $720,000 Three-year present value: $596,844
Developer Time Savings Due To Faster Builds

Evidence and data. Several interviewees explained that Chainguard’s hardened, continuously updated images allows their organizations to rebuild and redeploy applications much more quickly than they previously could. This was especially important for organizations with strict compliance requirements or frequent vulnerability discoveries because rebuilds can be delayed by manual remediation.

  • The senior director of product security in the energy sector said that before using Chainguard Containers, off-cycle releases to address vulnerabilities were extremely costly and disruptive and often doubled engineering effort. But they explained that with Chainguard Containers, it’s easy to replace vulnerable containers, eliminating the need for emergency releases and freeing up resources for planned work: “Within six weeks, we were able to completely take all of the open-source containers and rotate in all of the Chainguard images. So the solution allowed us to basically replace vulnerable containers with Chainguard images without any introduction to changes that would break anything.” The interviewee said having the ability to avoid or reduce the time needed for off-cycle releases and to focus on planned work meant that teams could deliver more features on schedule — and with less disruption: “Now we can include more features that we’ve promised on the roadmap in those same monthly releases since we’re not having to spend so much time burning down the technical debt vulnerabilities.”

  • The senior manager of developer platform in the transportation industry noted that before using Chainguard Containers, one FTE spent anywhere from 2 to 4 hours per week rebuilding due to vulnerabilities. The interviewee noted this was a recurring, ongoing requirement across the organization. “[With Chainguard,] most teams have reported being able to work on other areas to make sure their software delivery is efficient. So, they take that saved time and reallocate it into speed to delivery.”

  • Interviewees said with Chainguard Containers, their organizations use smaller, minimal container images, which reduce build, scan, and deployment time. Smoother integration and documentation reduced friction in updating pipelines, and automated dependency management reduced manual troubleshooting and testing. The senior manager of developer platform in the transportation industry reported that due to this, builds became faster and more reliable: “Some teams had reported Chainguard trimming a 20-minute build to 2 to 3 minutes.” Interviewees also explained that using smaller, more secure images also translates to less time spent on troubleshooting and more time spent on delivery. The senior manager of developer platform said, “From an enterprise standpoint, our delivery speed is 14% faster this year compared to last year, and we have 9% more releases.”

  • The platform engineering manager in healthcare reported a 5% to 10% increase in project throughput because time previously spent on security remediation was redirected to delivering business value.

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite organization releases biweekly across five applications.

  • Previously, 15% of the releases were delayed due to rebuilding, approval friction, or vulnerabilities on an ad hoc basis.

  • The composite spends about 720 developer hours annually on off-cycle releases.

  • Chainguard Containers reduces the number of hours required for this by 50%.

Risks. The impact of this benefit will vary among organizations based on the following factors:

  • The number and cadence of on- and off-cycle releases in the organization’s prior environment.

  • The amount of time developers spent on off-cycle releases in the prior environment.

  • The size of the organization’s development team.

  • The organization’s roadmap and strategy for innovation and feature development

Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $670,000.

50%

Time reduction for off-cycle releases

“We have had teams mention smaller images and quicker builds. The impact on smaller images is less network traffic, less time to come up, less time to load, and less storage in your package management systems — and then it’s less time to scan.”

Senior manager of developer platform, transportation

Developer Time Savings Due To Faster Builds
Ref. Metric Source Year 1 Year 2 Year 3
D1 Apps Composite 5 5 5
D2 Releases per app Composite 26 26 26
D3 Percentage of off-cycle releases delayed due to rebuilding, approval friction, or vulnerabilities Interviews 15% 15% 15%
D4 Off-cycle releases delayed due to need to rebuild (rounded) D1*D2*D3 20 20 20
D5 Developer time previously expended on off-cycle releases (hours) Interviews 720 720 720
D6 Time reduction for off-cycle releases due to Chainguard Containers Interviews 50% 50% 50%
D7 Time saved due to Chainguard Containers (hours) D4*D5*D6 7,200 7,200 7,200
D8 Productivity recapture TEI methodology 50% 50% 50%
Dt Developer time savings due to faster builds D7*D8*A5 $316,800 $316,800 $252,000
  Risk adjustment 15%      
Dtr Developer time savings due to faster builds (risk-adjusted)   $269,280 $269,280 $269,280
Three-year total: $807,840 Three-year present value: $669,660
Unquantified Benefits

Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:

  • Improved collaboration between security and developer operations. Several interviewees described friction or tension between SecOps and DevOps prior to adopting Chainguard Containers and explained how the solution helped alleviate these issues. They said Chainguard Containers provided a centralized, automated solution that made it easier for both security and development teams to achieve their goals and that developers became more motivated because they could see immediate results while security teams no longer had to market security or enforce compliance through friction.

    Interviewees explained that rolling out Chainguard images with partnership from security teams strengthened trust and created a shared understanding of responsibilities. Security teams became partners in the process, and both groups noted that using Chainguard images reduced friction by eliminating recurring debates about image quality and vulnerability expectations. The vice president of cloud platform engineering in manufacturing said: “[The] security operations [team members] are partners in this, so they know that if you’re using an image from Chainguard that is the best image we could get out of the market.”

    Overall, interviewees said Chainguard’s ease of adoption and automation helped change the relationship between the two teams from adversarial to collaborative, with the security team becoming an enabler rather than an obstacle.

  • Improved employee satisfaction and developer experience. Interviewees remarked that with Chainguard’s solution, teams indicated higher job satisfaction and relief. The engineering manager in the software industry said: “I’ve heard fewer complaints as we’ve seen fewer vulnerabilities. No one wants to work on vulnerabilities.” The senior manager of developer platform in the transportation industry echoed this sentiment: “When we actually show teams Chainguard, they are a lot happier with the process [because they don’t] have to deal with all the remediations.”

“It’s much cheaper to have Chainguard be accountable for container images. If you’re a company that’s going to solve the problem Chainguard is solving, it’s going to cost you more to do it in-house. To scale, it’s easier to work with Chainguard.”

Senior director of product security, energy

“If we as an organization were going to try and do this ourselves, it would take hundreds of people to do the same thing. Is that seriously a good investment into a company? It depends on what you care about. Do you care about hiring people whose sole job is this role? Or do you care about hiring people who build secure software and can [improve] your platform for your customers? It would be a huge investment for any organization to be able to do this and keep on top of it — especially as it scales.”

Vice president of cloud platform engineering, healthcare

Flexibility

The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement Chainguard Containers and later realize additional uses and business opportunities, including:

  • Future innovations and business growth. Interviewees said Chainguard enabled their organizations to release new features that would have otherwise remained stalled or unreleased and to pursue business opportunities that were previously out of reach due to security bottlenecks. They explained that the automation and reliability Chainguard provided freed up engineering capacity for potential innovation and could unlock new markets in the future. The engineering manager in the software industry noted, “Consistently we’ve been able to estimate five days fewer of infrastructure DevOps time per release, and so that time has been allocated to feature platform enhancements.”

“Any technology or tool like Chainguard Containers that reduces the burden on the developer enhances every aspect of innovation, building new capabilities, and speed to market. Chainguard’s solution encompasses all these aspects.”

Senior director of product security, energy

Analysis Of Costs

Quantified cost data as applied to the composite
Total Costs
Ref. Cost Initial Year 1 Year 2 Year 3 Total Present Value
Etr Chainguard subscription $71,500 $220,000 $220,000 $220,000 $731,500 $618,607
Ftr Implementation and ongoing management $38,720 $85,184 $7,744 $7,744 $139,392 $128,378
Gtr Change management and training $2,024 $8,096 $0 $0 $10,120 $9,384
  Total costs (risk-adjusted) $112,244 $313,280 $227,744 $227,744 $881,012 $756,369
Chainguard Subscription

Evidence and data. Interviewees said their organizations’ subscription costs for Chainguard Containers are based on one of two different models: per image or per developer. They also noted their subscriptions often include support and professional services. Pricing may vary. Contact Chainguard for additional details.

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite pays subscription costs of $65,000 during the initial period.

  • The composite pays $200,000 in annual subscription costs in Years 1 to 3.

Risks. The impact of this cost will vary among organizations based on the organization’s number of images or developers, based on which pricing model is used. 

Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $619,000.

“I tried to come up with a calculation [for the cost of achieving what we wanted to without Chainguard Containers], but the end number was double annually of what we’re paying Chainguard right now. Everything costs money. It either costs time or it costs dollars, and we don’t have enough time to solve what Chainguard solves for us with the [same] amount of money.”

Senior director of product security, energy

Chainguard Subscription
Ref. Metric Source Initial Year 1 Year 2 Year 3
E1 Chainguard subscription Composite $65,000 $200,000 $200,000 $200,000
Et Chainguard subscription E1 $65,000 $200,000 $200,000 $200,000
  Risk adjustment ↑10%        
Etr Chainguard subscription (risk-adjusted)   $71,500 $220,000 $220,000 $220,000
Three-year total: $731,500 Three-year present value: $618,607
Implementation And Ongoing Management

Evidence and data. Interviewees said implementation typically involved a short pilot or proof-of-concept phase in which teams integrated Chainguard images into the organization’s CI/CD pipeline or container registry. The time needed to migrate images varied widely depending on the number of images and the complexity of the services.

  • The engineering manager in the software industry reported that their organization’s initial adoption took one to two days and was handled by a single person. The vice president of application hosting and automation and the vice president of cloud platform engineering at the healthcare organization said 10 FTEs were involved in their company’s two-week rollout. The senior manager of developer platform in transportation noted that after a four-week pilot period, their organization used three FTEs to roll out the solution over eight four-day weeks. And the application security product lead in software described a pilot period that took several weeks and involved large teams with weekly syncs to address technical questions.

  • Interviewees described ongoing management as minimal and highly automated. Most reported that after the initial setup, maintenance requires a fraction of one FTE’s time — often a few minutes per day — or a small portion of one engineer’s workload to ensure images are up to date and to communicate changes to teams. The bulk of the work involves monitoring for updates, ensuring compliance, and occasionally answering developer questions, with most vulnerability remediation and image updates automatically handled by the Chainguard platform.

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite requires 400 hours to migrate some base images onto Chainguard Containers in the initial period and then 800 hours to migrate the rest in Year 1.

  • In Years 1 to 3, the composite dedicates 80 hours annually to ongoing management.

Risks. The impact of this cost will vary among organizations based on the size and scope of the organization’s application projects and the developer teams that use Chainguard Containers.

Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $128,000.

Implementation And Ongoing Management
Ref. Metric Source Initial Year 1 Year 2 Year 3
F1 Fully burdened hourly rate for an engineer Composite $88 $88 $88 $88
F2 Migration time for images (hours) Interviews 400 800 0 0
F3 Subtotal: Implementation costs F1*F2 $35,200 $70,400 $0 $0
F4 Engineering time needed for ongoing management (hours) Interviews 0 80 80 80
F5 Subtotal: Cost of ongoing management F1*F4 $0 $7,040 $7,040 $7,040
Ft Implementation and ongoing management F3+F5 $35,200 $77,440 $7,040 $7,040
  Risk adjustment ↑10%        
Ftr Implementation and ongoing management (risk-adjusted)   $38,720 $85,184 $7,744 $7,744
Three-year total: $139,392 Three-year present value: $128,378
Change Management And Training

Evidence and data. Interviewees said training and change management for Chainguard Containers requires a few hours of engineering time for onboarding and adoption.

  • The engineering manager in the software industry reported their organization didn’t need any formal training sessions and instead created a brief internal documentation page that engineers were able to use while adopting Chainguard images.

  • The senior director of product security in the energy sector said their organization’s onboarding training consists of some hourlong sessions and that they don’t anticipate a need for ongoing training.

  • The senior manager of developer platform in transportation noted their organization initially conducted one to two trainings per month over three or four months initially. These were primarily education sessions to help teams onboard and understand the benefits and usage of Chainguard images.

  • The application security product lead in software said their organization held a panel discussion and some training sessions, and that each was recorded and shared for asynchronous access.

  • The vice president of cloud platform engineering in healthcare noted that Chainguard handled most of the training effort through workshops and outreach, which required little time from internal staff.

Modeling and assumptions. Based on the interviews, Forrester assumes the composite organization onboards 20 engineers during the initial period and 80 in Year 1.

Risks. The impact of this cost will vary among organizations based on the following factors:

  • The number of FTEs the organization trains.

  • The depth and cadence of the training provided.

Results. To account for these risks, Forrester adjusted this cost upward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $9,000.

Change Management And Training
Ref. Metric Source Initial Year 1 Year 2 Year 3
G1 Engineers onboarded Composite 20 80 0 0
G2 Onboarding time (hours) Interviews 1 1 0 0
Gt Change management and training F1*G1*G2 $1,760 $7,040 $0 $0
  Risk adjustment 15%        
Gtr Change management and training (risk-adjusted)   $2,024 $8,096 $0 $0
Three-year total: $10,120 Three-year present value: $9,384

Financial Summary

Consolidated Three-Year, Risk-Adjusted Metrics

Cash Flow Chart (Risk-Adjusted)

[CHART DIV CONTAINER]
Total costs Total benefits Cumulative net benefits Initial Year 1 Year 2 Year 3
Cash Flow Analysis (Risk-Adjusted)
  Initial Year 1 Year 2 Year 3 Total Present Value
Total costs ($112,244) ($313,280) ($227,744) ($227,744) ($881,012) ($756,369)
Total benefits $0 $1,012,101 $1,012,101 $1,012,101 $3,036,303 $2,516,945
Net benefits ($112,244) $698,821 $784,357 $784,357 $2,155,291 $1,760,576
ROI           233%
Payback           <6 months

 Please Note

The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.

These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.

The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.

From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in Chainguard Containers.

The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Chainguard Containers can have on an organization.

Due Diligence

Interviewed Chainguard stakeholders and Forrester analysts to gather data relative to Chainguard Containers.

Interviews

Interviewed eight decision-makers from six organizations using Chainguard Containers to obtain data about costs, benefits, and risks.

Composite Organization

Designed a composite organization based on characteristics of the interviewees’ organizations.

Financial Model Framework

Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.

Case Study

Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.

Total Economic Impact Approach
Benefits

Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.

Costs

Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.

Flexibility

Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.

Risks

Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”

Financial Terminology
Present value (PV)

The present or current value of (discounted) cost and benefit estimates given at an interest rate (the discount rate). The PV of costs and benefits feed into the total NPV of cash flows.

Net present value (NPV)

The present or current value of (discounted) future net cash flows given an interest rate (the discount rate). A positive project NPV normally indicates that the investment should be made unless other projects have higher NPVs.

Return on investment (ROI)

A project’s expected return in percentage terms. ROI is calculated by dividing net benefits (benefits less costs) by costs.

Discount rate

The interest rate used in cash flow analysis to take into account the time value of money. Organizations typically use discount rates between 8% and 16%.

Payback

The breakeven point for an investment. This is the point in time at which net benefits (benefits minus costs) equal initial investment or cost.

Appendix A

Total Economic Impact

Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.

Appendix B

Endnotes

1 Source: 2025 Open Source Security and Risk Analysis Report, Synopsys.

2 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.

3 Source: Forrester’s Security Survey, 2024.

4 Ibid.

5 Source: 2025 Open Source Security and Risk Analysis Report, Synopsys.

Disclosures

Readers should be aware of the following:

This study is commissioned by Chainguard and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.

Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Chainguard Containers.

Chainguard reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.

Chainguard provided the customer names for the interviews but did not participate in the interviews.

Consulting Team:

Anahita Sultana

Published

January 2026