The Total Economic Impact™ Of DTEX

Business Benefits Enabled By DTEX

December 2024

Although insider incidents comprise a large percentage of data breaches, many security teams don’t prioritize insiders as a threat vector and instead focus their efforts almost exclusively on external threats.1 Security teams need a tool that can provide a comprehensive view of user behavior across their entire organization, allowing them to proactively detect and address potential risks from within — including those from compromised credentials.

DTEX provides advanced insider threat detection and risk management solutions that continuously monitor and analyze user behavior and activities. Using sophisticated analytics and real-time data to identify the intent behind user behavior, DTEX enables organizations to mitigate potential security threats by proactively identifying risky behavior across an enterprise before they escalate. It also consolidates data loss prevention (DLP), user entity and behavior analytics (UBEA), and user activity monitoring (UAM) to foster a culture of security and trust. This comprehensive approach helps protect sensitive information and stop data loss through dynamic risk scoring. DTEX boosts security operation center (SOC) activities with behavioral intelligence and accelerates incident response with real-time forensics.

DTEX commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential benefits and financial impacts enterprises may realize by deploying DTEX.2

To better understand the benefits and risks associated with this investment, Forrester interviewed five representatives with experience using DTEX. The representatives work at organizations in telecommunications, pharmaceuticals, banking, and energy industries that range from 8,000 to 150,000 employees. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a multibillion-dollar North American-based global enterprise in the critical infrastructure space with 50,000 employees and 30,000 endpoints monitored by DTEX.

Interviewees said that prior to using DTEX, their organizations had disparate tooling and limited capabilities to stand up a comprehensive insider risk program. Prior environments did not provide adequate visibility into user behavior and insider risk, creating difficulty in identifying and stopping data leaks, account misuse, AI abuse, intellectual property (IP) theft, co-employment, and more. Previous efforts to address incidents were reactive, manual, and piecemeal.

After the investment in DTEX, the interviewees noted that they enhanced data security, gained visibility into all data movement (including file name changes), and captured a comprehensive picture of user behavior. Interviewees said that these updates enabled them to reduce their security stack and total cost of ownership (TCO), increase operational efficiency, and improve regulatory compliance, which ultimately led to reduced risk of costly insider data breaches and improved overall organizational resilience.

Key Findings

Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:

  • Tech stack consolidation worth $3.3 million over three years. The composite organization decreases its TCO by consolidating multiple security functions into a single, integrated platform, allowing it to retire costly legacy solutions. By combining user behavior analytics, user monitoring, and forensics into one cohesive system with DTEX, the composite can eliminate the need for disparate tools and associated management and maintenance expenses. This consolidation not only reduces software and hardware costs but also minimizes the administrative burden on IT teams, leading to lower operational expenses.
  • Insider risk efficiencies worth $705,000 over three years. The composite organization enhances insider risk analyst productivity by gaining comprehensive, real-time visibility into user activities, thereby reducing the time required for investigations. Using DTEX, analysts can focus on user behavior and activities by continuously monitoring applications to spot suspicious events with full context. This streamlined approach not only accelerates the investigation process but also enhances threat detection accuracy, enabling analysts to focus on high-value tasks such as risk mitigation and strategy development.

Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:

  • Avoided data breach costs. By continuously assessing user behavior and context, DTEX helps the composite identify insider threats, compromised accounts, and data exfiltration attempts with higher precision than was possible in the prior environment. This proactive approach ensures that security teams are promptly alerted to suspicious activities, enabling them to take quick and effective action to mitigate risks.
  • Protected IP. The composite can increase its IP protection with DTEX, including AI initiatives, by constantly monitoring and analyzing user behavior, detecting potential insider threats, preventing data loss through policy enforcement, and facilitating efficient incident response.
  • Improved policy configuration and management. The composite streamlines its policy configuration and management using DTEX’s out-of-the-box, customizable policies.
  • Improved collaboration between security and other teams. Insider risk spans cross-functional groups: legal teams are often tasked with providing compliance guidance and HR assists in recognizing insider risks. With DTEX, the composite strengthens its cross-functional collaboration and threat management efforts across cybersecurity, legal, HR, IT, and other related teams.
  • Reduced shadow IT. DTEX helps the composite organization detect shadow IT by collecting and analyzing information on devices, applications, and users. This enables security teams to safeguard non-IT systems from internal and external malicious attacks, enhancing overall cybersecurity.

The representative interviews and financial analysis found that a composite organization experiences quantified benefits of $3.99 million over three years. There are also several unquantified benefits that could add value to organizations.

75%

Reduction in investigation time with DTEX

“No one can deny the benefit that DTEX has provided. … The return on investment that we’ve been able to get from the tool has been great.”

Manager of global cyber detection and response, technology

“DTEX has provided rich context of worker behavior that has allowed us to more accurately determine intent and respond to events that we would not have previously seen. Our use case customizations allow us to pivot to any situation we are concerned about.”

Director of insider risk, pharmaceuticals

Key Statistics

  • icon icon

    Quantified Benefits PV

    $3.99M
  • icon icon

    Reduction in investigation time with DTEX

    75%
  • icon icon

    Tech stack consolidation savings

    $3.29M
  • icon icon
  • icon icon
  • icon icon
  • icon icon
  • icon icon

Benefits (Three-Year)

Tech stack consolidation Insider threat risk efficiencies [CONTENT] [CONTENT] [CONTENT] [CONTENT] [CONTENT] [CONTENT]

TEI Framework And Methodology

From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in DTEX.

The objective of the framework is to identify the benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that DTEX can have on an organization.

  1. Due Diligence

    Interviewed DTEX stakeholders and Forrester analysts to gather data relative to DTEX.

  2. Interviews

    Interviewed five representatives at organizations using DTEX to obtain data about benefits and risks.

  3. Composite Organization

    Designed a composite organization based on characteristics of the interviewees’ organizations.

  4. Financial Model Framework

    Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.

  5. Case Study

    Employed fundamental elements of TEI in modeling the investment impact: benefits, flexibility, and risks. Given the increasing sophistication of financial analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.

Disclosures

Readers should be aware of the following:

This study is commissioned by DTEX and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.

Forrester makes no assumptions as to the potential benefits that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of using DTEX.

DTEX reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.

DTEX provided the customer names for the interviews but did not participate in the interviews.

Consulting Team:

Nikoletta Stergiou

Luca Son

M
K

Cookie Preferences

Accept Cookies

A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.

Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.

Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.

Please see our Privacy Policy for more information.