Total Economic Impact

The Total Economic Impact™ Of Flare

Cost Savings And Business Benefits Enabled By Flare

A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY Flare, July 2025

[CONTENT]

Total Economic Impact

The Total Economic Impact™ Of Flare

Cost Savings And Business Benefits Enabled By Flare

A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY Flare, July 2025

Forrester Print Hero Background
M
K
[CONTENT]
[CONTENT]

Executive Summary

As corporate IT security environments become increasingly complex, threat actors wreak more havoc faster than ever, causing severe financial implications for organizations that are unprepared. With 18% of external attacks carried out using weak or stolen credentials, acting quickly on detected threats is key.1 Threat intelligence tools provide vital data and insights to mitigate exposures of credentials and other assets that may lead to ransomware attacks, data breaches, and security incidents.

Flare is an external threat intelligence solution. It provides threat intelligence by monitoring and unifying data from cybercrime communities across the clear and dark web. In particular, Flare places emphasis on identity threat exposures and gives alerts for leaked credentials, active sessions, stealer logs, and related threats found in these environments.

Flare commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Flare.2 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Flare on their organizations.

321%

Return on investment (ROI)

 

$699K

Net present value (NPV)

 

To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed five decision-makers from four organizations with experience using Flare. For the purposes of this study, Forrester aggregated the experiences of the interviewees and combined the results into a single composite organization, which is a global technology organization with a security team of 25 and revenue of $10 billion per year.

Interviewees said that prior to using Flare, their organizations used another threat intelligence solution but were dissatisfied with the level of intelligence and service it provided. These limitations led to delays in identity exposures and dark web activity, often detecting threats too late. In addition, the interviewees experienced inefficiencies due to manual efforts, alert fatigue, and high costs.

After the investment in Flare, the interviewees received detailed, transparent, actionable intelligence including malware logs, copies of data, and actual passwords. The quality of this data allowed them to quickly identify and mitigate risks associated with credential exposure.

Key Findings

Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:

  • A 25% reduction in the likelihood of a severe data breach, reducing the cost of a material breach. The composite organization has a 68% likelihood of experiencing one or more serious data breaches per year in which the organization’s data is potentially compromised, at an average potential cost of $4.4 million. With Flare, the composite reduces by 25% the likelihood of a severe data breach caused by an external attack. For the composite, enabling Flare helps the organization avoid $509,000 in costs associated with a material breach.

  • A 25% increase in efficiency in labor hours devoted to threat intelligence. The composite reduces the amount of time spent on threat intelligence tasks including dark web research, incident response, internal offensive security operations, threat reporting, threat risk prioritization, and language translation. This allows the security team to reallocate more than 1,300 hours to higher-level activities, resulting in $167,000 of avoided labor costs.

  • A 31% reduction in license fees by moving from prior solution to Flare with a reduction in internal labor hours for maintenance. The composite organization is able to eliminate the license costs for the prior threat intelligence solution as well as ongoing maintenance labor hours for that solution, saving $240,000 in costs over three years.

Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:

  • Flare team engagement and support. The composite organization values the high level of engagement and dedication demonstrated by the Flare team as they partner to solve threat issues. This partnership enables the composite to expand the size of its team by leaning on the Flare team for support.

  • Visibility into threat actor and cybercrime ecosystems. By gaining visibility into the attackers’ world, including dark web chats, the composite organization can see how attackers are behaving. This visibility helps the composite stay ahead of potential security issues.

Costs. Three-year, risk-adjusted PV costs for the composite organization include:

  • Subscription fees are $208,000. Flare’s license fees are based on the number of identifiers, which are items used to monitor activities related to different resources including domains, names, keywords, IP addresses, bank identification numbers (BIN), and queries (a potential combination of several identifier types).

  • Integration and training costs total less than $10,000. In addition to fees paid to Flare for the license, the composite incurs internal costs related to the implementation of and training on the solution.

The financial analysis that is based on the interviews found that a composite organization experiences benefits of $916,000 over three years versus costs of $218,000, adding up to a net present value (NPV) of $699,000 and an ROI of 321%.

“The difference with Flare is the fact that their intelligence is deeper and more detailed. Being able to produce malware logs, copies of data, data leaks, and the like — it is very powerful for us to have that visibility. There are very few vendors in that space able to do what Flare does.”

Senior incident and hunting specialist, consulting

Key Statistics

321%

Return on investment (ROI) 

$916K

Benefits PV 

$699K

Net present value (NPV) 

<6 months

Payback 

Benefits (Three-Year)

[CHART DIV CONTAINER]
Reduced risk of exposure to breach Labor efficiencies Reduction in costs

The Flare Customer Journey

Drivers leading to the Flare investment
Interviews
Role Industry Region Revenue Security Team Size Identifiers
VP of software and cloud Telecom Global $13 billion 60 1,000
• Senior incident and hunting specialist
• Cybersecurity technology advisor
Consulting Global $1 billion 6 4,000
Senior incident response engineer Electronics Global $27 billion 30 5,000
Director of IT Sports Canada Not for profit 3 1,000
Key Challenges

Before adopting Flare, the interviewees’ organizations used various other threat intelligence solutions but were generally dissatisfied with the level of intelligence and service they provided.

Interviewees noted how their organizations struggled with common challenges, including:

  • Lack of detailed threat intelligence. Prior solutions cast a wide net and provided general intelligence, but they did not provide depth and detail. This lack of detailed intelligence made it difficult for organizations to act in a timely manner. The senior incident response engineer at the electronics firm said, “We had the top of the iceberg, but we didn’t have what was beneath the surface.”
    Prior solution providers were unable to provide the details interviewees needed to act quickly to mitigate the risk. The same senior incident response engineer said, “In our prior environment, we would receive an alert that we potentially had an infected system, but when we asked for more detailed information including malware logs, they told us no.”

  • Inefficiencies due to manual effort. Interviewees described the significant manual effort required for threat intelligence gathering, dark web monitoring, and incident response. This included manual investigations and correlation of data from multiple siloed tools. The VP of software and cloud at the telecom noted: “We spent a lot of time doing manual threat monitoring and management, including manual searches on the dark web. Our use of multiple unintegrated tools required manual correlation of information, leading to inconsistencies and inefficiencies.”

  • Alert fatigue. The interviewees’ organizations experienced a high volume of alerts, many of which were false positives. This created alert fatigue and added noise, making it difficult to prioritize and respond to genuine threats. The VP of software and cloud explained, “The sheer volume of alerts generated by threat intelligence feeds led to alert fatigue among our security team, making it difficult to maintain a high level of vigilance.”

  • High costs. Several interviewees thought their prior solutions were expensive, especially when they failed to deliver detailed, actionable intelligence. Prior vendors’ cost models, particularly those charging by the seat, were perceived as restrictive and not scalable. The cybersecurity technology advisor at the consulting firm said: “We felt that the existing service was getting too expensive for the limited visibility it was giving us. Also, we did not like the seat-based licensing model, because we kept feeling boxed in.”

“We struggled with limited visibility into external threats, making it difficult to identify and respond to potential security issues promptly.”

VP of software and cloud, telecom

Solution Requirements/Investment Objectives

The interviewees searched for a solution that could provide:

  • Detailed, actionable intelligence. This included actual passwords, malware logs, copies of data, and what specifically had been exfiltrated from compromised machines. The director of IT at the sports company said, “We wanted intelligence that wasn’t too broad — we needed something we could act on.”

  • Broad data sources and coverage. Interviewees’ organizations sought the ability to aggregate intelligence from a wide range of sources. The senior incident response engineer at the electronics firm said, “We needed to see what was happening on the dark web forums, [messaging channels], all of it.”

  • Integration capabilities. The interviewees wanted seamless integration with existing security infrastructure such as security information and event management (SIEM) and security orchestration, automation, and response (SOAR) tools to enrich internal alerts. The VP of software and cloud at the telecom said: “We didn’t want another siloed tool. It had to integrate with our existing stack.”

  • Cost-effectiveness and scalability. The interviewees were not looking for a low-cost solution, but rather a solution that delivered value and flexibility. The senior incident and hunting specialist at the consulting firm said: “The pricing model had to make sense. We didn’t want to be pinned to a seat-based model.”

Composite Organization

Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:

Description of composite. The composite is a globally distributed organization generating $10 billion in annual revenue. It employs 15,000 people worldwide, with 25 FTEs dedicated to security operations and incident response. The composite’s contract with Flare includes 4,000 identifiers.

Deployment characteristics. The composite organization begins using Flare in Year 1, following a one-week implementation period.

 KEY ASSUMPTIONS

  • $10 billion in revenue

  • 15,000 employees

  • 25 FTEs on security team

  • 4,000 identifiers

Analysis Of Benefits

Quantified benefit data as applied to the composite
Total Benefits
Ref. Benefit Year 1 Year 2 Year 3 Total Present Value
Atr Reduced risk of exposure to breach $204,705 $204,705 $204,705 $614,114 $509,071
Btr Labor efficiencies $67,129 $67,129 $67,129 $201,388 $166,940
Ctr Reduction in costs $96,688 $96,688 $96,688 $290,063 $240,448
  Total benefits (risk-adjusted) $368,522 $368,522 $368,522 $1,105,565 $916,459
Reduced Risk Of Exposure To Breach

Evidence and data. Interviewees said the quality of the intelligence Flare produced helped them detect threats and take action before the threats caused financial losses or damaged their organization’s brand. Interviewees described the intelligence Flare provided as:

  • Actionable. The senior incident and hunting specialist at the consulting firm described how they were able to get ahead of a threat before the credentials were weaponized: “It’s very proactive with Flare. We know when the credential has been taken. We know when they go up for sale. We know when they’ve been sold. What Flare allows us to do is get ahead of it, get it blocked, [and] get it locked down before it’s sold and weaponized.”
    The cybersecurity technology advisor at the consulting form described the speed with which they could act before harm was done: “The key use case is the speed that we can react at. If somebody is masquerading as the organization for the purposes of phishing, we can get that phishing domain taken down. It’s actionable.”

“By proactively identifying leaked credentials, exposed assets, and other risks, Flare helps us stay ahead of potential security issues.”

VP of software and cloud, telecom

  • Transparent. Compared to prior solutions, interviewees described how Flare doesn’t just tell them a threat is present, it lets them see how they have been compromised. The cybersecurity technology advisor at the consulting firm described the ability to see content in a forum chat used by the threat actors: “This is what we love about Flare. It gives us very specific threat intelligence that we can react to and secure ourselves. Instead of just knowing there’s a threat actor active in our area, we can see the forum chat of the members of that crime gang. It doesn’t just say there’s an attack coming, we can see the tools, tactics, and procedures the actor will use against us.”
    The senior incident and hunting specialist at the consulting firm described the value of having access to the malware logs: “We can access the malware logs and see exactly what credentials have been compromised. We can identify potentially active sessions and then close them down.”

“We don’t just know something’s happened. We can see exactly how we’ve been compromised. That’s how Flare is unique — the depth and breadth of the intelligence it gives us.”

Director of IT, sports

  • Detailed. Interviewees described how compared to prior solutions that provided more generalized threat intelligence, Flare delivers detailed intelligence. The senior incident response engineer at the electronics firm said: “We get fabulous details about leaked credentials. Previously, if we were lucky, we would receive an obfuscated password. Flare allows us to see the actual password being compromised, and because we know the actual password, we can check to see if it is being reused for other accounts.”

  • Preventative. The VP of software and cloud at the telecom described how his ability to react quickly to threats prevents them from becoming incidents: “We react as soon as credentials appear or a machine has been compromised. Because we react quickly, we prevent the incident before it happens, and that’s the real power of Flare.”

  • Comprehensive. The senior incident response engineer at the electronics firm described the scope of the intelligence. They said, “Flare gathers threat intelligence from a wide range of sources giving us a complete picture of the threat landscape, including emerging threats and vulnerabilities. “

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite organization has a 68% likelihood of experiencing one or more serious data breaches per year in which the organization’s data is potentially compromised. For the purpose of this analysis, this is held flat year over year.3

  • Forrester estimates that 40% of breaches are addressable with Flare. These include external attacks targeting the organization or an employee’s remote work environment, its external ecosystem, and some categories of internal incidents.4

  • The cumulative cost of data breaches in the prior environment is $4,427,000.5 For the composite, these combined factors yield $1,023,522 of annualized risk exposure addressable with Flare.

  • Compared to the prior environment, Flare reduces the risk of exposure to breach by 25%.

Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:

  • An organization’s security context, including its security maturity, and the likelihood, number, cost, and severity of exposure-related security incidents in the prior environment.

Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $509,000.

25%

Reduction in risk of exposure to breach with Flare compared to prior environment

“Flare continuously monitors the dark web for mentions of our credentials or sensitive data, allowing us to quickly identify and mitigate risks associated with credential exposure.”

VP of software and cloud, telecom

Reduced Risk Of Exposure To Breach
Ref. Metric Source Year 1 Year 2 Year 3
A1 Cumulative cost of breaches for the composite Forrester research $4,427,000 $4,427,000 $4,427,000
A2 Likelihood of the composite experiencing one or more breaches Forrester research 68% 68% 68%
A3 Percentage of breaches from external attacks targeting the organization, its remote environments and external ecosystem, and certain categories of internal incidents Forrester research 85% 85% 85%
A4 Percentage of those attacks addressable with Flare Composite 40% 40% 40%
A5 Annual risk exposure addressable with Flare A1*A2*A3*A4 $1,023,522 $1,023,522 $1,023,522
A6 Reduced risk of exposure to breach costs from addressable attacks with Flare Composite 25% 25% 25%
At Reduced risk of exposure to breach A5*A6 $255,881 $255,881 $255,881
  Risk adjustment 20%      
Atr Reduced risk of exposure to breach (risk-adjusted)   $204,705 $204,705 $204,705
Three-year total: $614,114 Three-year present value: $509,071
Labor Efficiencies

Evidence and data. Compared to their prior environment, interviewees reported approximately 25% reductions in manual effort with Flare’s threat detection in the following areas:

  • Dark web research. The senior incident response engineer at the electronics firm noted a significant reduction in the time spent conducting dark web research: “Before, we spent anywhere between 8 and 10 hours a week just trying to figure out where to go on the dark web [to hunt] for identity exposures and ransomware notices. Immediately, we outsourced the dark web research because Flare handles the personas, the research, and breaking into the bad guy networks. We never would have gotten that far without Flare.”

  • Incident response. The VP of software and cloud at the telecom reported how Flare reduced the time they spent determining the cause of an incident: “Flare has sped up our research into an incident. Rather than spending hours crawling around the dark web, now we just spend a few minutes checking on a hunch, and we can eliminate ideas on how somebody came into possession of something.”

  • Red/purple teaming. The senior incident response engineer at the electronics firm described how Flare decreased the time spent on internal offensive security operations: “When I flip a switch and go to offensive mode and start trying to attack our own stuff, I will absolutely go to Flare to see which employees might have credentials out there for us to use. Before, it would have taken hours to assemble a solid password-spraying list. Now, it takes minutes.”

  • Threat reporting. Flare uses AI to generate threat reports from curated data feeds. Interviewees described how these threat flow reports reduced the amount of time to share information on potential threats. The senior incident and hunting specialist at the consulting firm explained: “The AI tool will generate a report from the gathered intelligence that you can refine. The difference is 10 minutes to put out an urgent threat report versus an hour. Previously, our analysts would spend time manually trolling for the information. Flare delivers the information we need in a validated and reputable form that we can do something with very, very quickly.”
    He went on to explain how these threat reports reduced the amount of incoming information analysts had to sort through: “What Flare does is curate the threat feed to ensure we get what’s important to us. The AI learns what we’re interested in and what our identifiers are and targets the threat intelligence rather than spray a continual fire hose of information.”

  • Threat risk prioritization. Flare uses a detailed set of rules to prioritize threats based on their potential impact. The VP of software and cloud at the telecom described how this has reduced the number of false positives and helped them focus on the most critical issues. They shared, “Flare’s automated risk scoring and threat intelligence feeds have reduced the number of false positives by 50%, allowing us to prioritize genuine threats more effectively.”

  • Language translation. Flare uses AI to translate foreign language communications into English. The cybersecurity technology advisor at the consulting firm described how this saves time. They said, “A lot of communication on cybercrime forums is in Russian, and the AI will automatically translate it into English, which makes it readable and immediately actionable.”

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • Three FTEs on the security team are devoted to managing threat intelligence.

  • The majority of the FTEs’ work time, 85%, is impacted by Flare.

  • As a result of using Flare, the security FTEs reduce the time spent on managing threat intelligence by 25%.

  • The majority of the labor hours saved, 75%, are recaptured and spent on other security tasks.

Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:

  • An organization’s security context, including its security maturity, and the likelihood, number, cost, and severity of exposure-related security incidents in the prior environment.

  • The number of security FTEs dedicated to managing threat intelligence.

  • The extent to which an organization adopts AI tools.

Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $167,000.

“The roles within our security team have evolved, with analysts now focusing on high-risk threats [and] spending less time on manual monitoring, leading to more efficient alert triage and operational efficiency.”

Senior incident response engineer, electronics

Labor Efficiencies
Ref. Metric Source Year 1 Year 2 Year 3
B1 Security FTEs working on threat intelligence Composite 3 3 3
B2 Percentage of work time impacted by Flare Interviews 85% 85% 85%
B3 Increased efficiency with Flare Interviews 25% 25% 25%
B4 Average fully burdened hourly rate for a security resource Composite $75 $75 $75
B5 Productivity recapture TEI methodology 75% 75% 75%
Bt Labor efficiencies (B1*2,080)*B2*B3*B4*B5 $74,588 $74,588 $74,588
  Risk adjustment 10%      
Btr Labor efficiencies (risk-adjusted)   $67,129 $67,129 $67,129
Three-year total: $201,388 Three-year present value: $166,940
Reduction In Costs

Evidence and data. Flare’s functionality exceeded the capabilities of legacy solutions, and as a result, the interviewees said they reduced or eliminated their use of prior tools. The senior incident and hunting specialist at the consulting firm said: “We moved away from our prior solution because it was expensive and didn’t give us the level of detail we needed. And the seat-based pricing made it hard to scale.”

The VP of software and cloud at the telecom said they were able to eliminate some prior tools and decrease the cost of cyber insurance. They said, “We’ve been able to eliminate the use of some legacy tools and point solutions, including reduced dependency on external Managed Security Service Providers (MSSPs), and we lowered cyber insurance premiums.”

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • The composite’s prior annual threat intelligence licensing fees were $110,000.

  • The composite’s team spent 50 hours per year managing prior threat intelligence tools.

Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:

  • An organization’s security context, including its security maturity in the prior environment, which will impact the cost of threat intelligence licensing fees.

  • The type of threat intelligence tool deployed in the prior environment.

Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $240,400.

Reduction In Costs
Ref. Metric Source Year 1 Year 2 Year 3
C1 Prior solution’s subscription cost Interviews $110,000 $110,000 $110,000
C2 Ongoing maintenance in prior environment (hours) Interviews 50 50 50
C3 Average fully burdened hourly rate for a security resource B4 $75 $75 $75
Ct Reduction in costs C1+(C2*C3) $113,750 $113,750 $113,750
  Risk adjustment 15%      
Ctr Reduction in costs (risk-adjusted)   $96,688 $96,688 $96,688
Three-year total: $290,063 Three-year present value: $240,448
Unquantified Benefits

Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:

  • Flare team engagement and support. Interviewees praised the level of support they received from the Flare team. The senior incident response engineer at the electronics firm said: “You can tell when you’re working with everybody, from sales to the engineers, that they’re driven by passion. It seems like everybody loves being there, and they just want to make cybercriminals pay.”

  • Visibility into threat actor and cybercrime ecosystems. Interviewees find value in the view Flare provides into the world of threat actors. The VP of software and cloud at the telecom said: “Flare enables us to have an unparalleled view into the attackers’ world. There’s nobody else that offers that type of view.”
    The senior incident response engineer at the electronics firm suggested that he didn’t realize what he was missing previously by not having a view into dark web chats. They said, “One of the biggest things we didn’t even know we were missing was the visibility into dark web chats, including [messaging channels].”
     

“Flare has fantastic penetration into the threat actor and cybercrime ecosystems, and what they provide is very good and highly reliable. We get very few false positives, and Flare rovides great detail and supporting evidence.”

Senior incident and hunting specialist, consulting

Flexibility

The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement Flare and later realize additional uses and business opportunities, including:

  • Amplified impact. The senior incident response manager at the electronics firm described how Flare improved the effectiveness of their team: “Flare has become a force multiplier for us. We don’t have a big team, but with Flare, we’re doing the work of a much larger one.”

“You give them a small piece of the puzzle, and Flare quickly jumps in and forms a team. All of a sudden, your team has doubled in size because people at Flare care about the relationship. These are the kind of people you want on your team if there’s a cybersecurity incident.”

Cybersecurity technology advisor, consulting

Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Total Economic Impact Approach).

Analysis Of Costs

Quantified cost data as applied to the composite
Total Costs
Ref. Cost Initial Year 1 Year 2 Year 3 Total Present Value
Dtr Flare subscription fees $0 $83,600 $83,600 $83,600 $250,800 $207,901
Etr Internal costs for deployment and maintenance $4,785 $1,980 $1,980 $1,980 $10,725 $9,709
  Total costs (risk-adjusted) $4,785 $85,580 $85,580 $85,580 $261,525 $217,610
Flare Subscription Fees

Evidence and data. Flare’s license fees are based on the number of identifiers — that is, items used to monitor activities related to different resources including domains, names, keywords, IP addresses, BIN numbers, and queries (a potential combination of several identifier types).

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • Subscription fees for the composite organization are $76,000 and are based on 4,000 identifiers.

  • Pricing may vary. Contact Flare for additional details.

Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:

  • The number of identifiers licensed.

Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $208,000.

“Traditionally, when you buy a threat intelligence tool, you buy the platform and then you pay for a certain number of seats. With Flare, there’s none of that. We can have as many seats as we like. What we’re paying for is a certain number of identifiers, such as keywords and IP addresses that are of interest to us. It’s incredibly flexible for us.”

Senior incident and hunting specialist, consulting

Flare Subscription Fees
Ref. Metric Source Initial Year 1 Year 2 Year 3
D1 Flare subscription fees Composite $0 $76,000 $76,000 $76,000
Dt Flare subscription fees D1 $0 $76,000 $76,000 $76,000
  Risk adjustment ↑10%        
Dtr Flare subscription fees (risk-adjusted)   $0 $83,600 $83,600 $83,600
Three-year total: $250,800 Three-year present value: $207,901
Internal Costs For Deployment And Maintenance

Evidence and data. In addition to fees paid to Flare for the license, the interviewees described internal costs related to the implementation of and training on the solution.

  • Implementation efforts included a security review; setup and configuration to monitor relevant identifiers; and integration with SIEM, SOAR, and other internal systems to enrich alerts and workflows.

  • The training process included a dedicated session with Flare, followed by a few additional hours of hands-on use to become proficient with the platform.

Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:

  • One technical FTE is involved in the technical implementation.

  • Three security team members participate in a total of 6 hours each for training and onboarding.

  • Following implementation, ongoing maintenance of the solution requires 24 hours per year.

Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:

  • Security team members’ prior experience using threat intelligence tools.

  • The level of integration with other internal systems.

Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of less than $10,000.

“Flare integrates seamlessly with our existing security tool stack, enriching the data available for security monitoring and helping us perform faster alert triage.”

VP of software and cloud, telecom

Internal Costs For Deployment And Maintenance
Ref. Metric Source Initial Year 1 Year 2 Year 3
E1 Total time for technical deployment and integrations (hours) Interviews 40      
E2 Security resources involved in training Interviews 3      
E3 Training time per security resource (hours) Interviews 6      
E4 Average fully burdened hourly rate  for a security resource B4 $75      
E5 Subtotal: Deployment and training (E1+(E2*E3))*E4 $4,350      
E6 Ongoing maintenance time (hours) Interviews 0 24 24 24
E7 Average fully burdened hourly rate for a security resource B4 $0 $75 $75 $75
E8 Subtotal: Product administration E6*E7 $0 $1,800 $1,800 $1,800
Et Internal costs for deployment and maintenance E5+E8 $4,350 $1,800 $1,800 $1,800
  Risk adjustment ↑10%        
Etr Internal costs for deployment and maintenance (risk-adjusted)   $4,785 $1,980 $1,980 $1,980
Three-year total: $10,725 Three-year present value: $9,709

Financial Summary

Consolidated Three-Year, Risk-Adjusted Metrics

Cash Flow Chart (Risk-Adjusted)

[CHART DIV CONTAINER]
Total costs Total benefits Cumulative net benefits Initial Year 1 Year 2 Year 3
Cash Flow Analysis (Risk-Adjusted)
  Initial Year 1 Year 2 Year 3 Total Present Value
Total costs ($4,785) ($85,580) ($85,580) ($85,580) ($261,525) ($217,610)
Total benefits $0 $368,522 $368,522 $368,522 $1,105,565 $916,459
Net benefits ($4,785) $282,942 $282,942 $282,942 $844,040 $698,849
ROI           321%
Payback           <6 months

 Please Note

The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.

These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.

The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.

From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in Flare.

The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Flare can have on an organization.

Due Diligence

Interviewed Flare stakeholders and Forrester analysts to gather data relative to Flare.

Interviews

Interviewed four decision-makers at organizations using Flare to obtain data about costs, benefits, and risks.

Composite Organization

Designed a composite organization based on characteristics of the interviewees’ organizations.

Financial Model Framework

Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.

Case Study

Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.

Total Economic Impact Approach
Benefits

Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.

Costs

Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.

Flexibility

Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.

Risks

Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”

Financial Terminology
Present value (PV)

The present or current value of (discounted) cost and benefit estimates given at an interest rate (the discount rate). The PV of costs and benefits feed into the total NPV of cash flows.

Net present value (NPV)

The present or current value of (discounted) future net cash flows given an interest rate (the discount rate). A positive project NPV normally indicates that the investment should be made unless other projects have higher NPVs.

Return on investment (ROI)

A project’s expected return in percentage terms. ROI is calculated by dividing net benefits (benefits less costs) by costs.

Discount rate

The interest rate used in cash flow analysis to take into account the time value of money. Organizations typically use discount rates between 8% and 16%.

Payback

The breakeven point for an investment. This is the point in time at which net benefits (benefits minus costs) equal initial investment or cost.

Appendix A

Total Economic Impact

Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.

Appendix B

Endnotes

1 Source: Forrester’s Security Survey, 2024. Base: 1,240 security decision-makers who experienced an external attack when their company was breached.

2 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.

3 Source: Regression analysis of the likelihood of experiencing one or more breaches, using the frequency that organizations experienced breaches in the past 12 months as reported by security decision-makers. The composite organization’s revenue is used as the input to the regression formula. Source: Forrester’s Security Survey, 2024. Question: “How many times do you estimate that your organization’s sensitive data was potentially compromised or breached in the past 12 months?” Base: 2,769 global security decision-makers.

4 Percentage of breaches by primary attack vector, as reported by security decision-makers whose organizations experienced at least one breach in the past 12 months. Source: Forrester’s Security Survey, 2024. Question: “Of the times that your organization’s sensitive data was potentially compromised or breached in the past 12 months, please indicate how many of each fall into the categories below.” Base: 1,542 global security decision-makers who have experienced a breach in the past 12 months.

5 Source: Regression analysis of the reported total cumulative costs of all breaches experienced by security decision-makers’ organizations in the past 12 months. The composite organization’s revenue is used as the input to the regression formula. Source: Forrester’s Security Survey, 2024. Question: “Using your best estimate, what was the total cumulative cost of all breaches experienced by your organization in the past 12 months?” Base: 1,660 global security decision-makers who have experienced a breach in the past 12 months.

Disclosures

Readers should be aware of the following:

This study is commissioned by Flare and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.

Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Flare. For any interactive functionality, the intent is for the questions to solicit inputs specific to a prospect's business. Forrester believes that this analysis is representative of what companies may achieve with Flare based on the inputs provided and any assumptions made. Forrester does not endorse Flare or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, Flare and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided ‘AS IS,’ and Forrester and Flare make no warranties of any kind.

Flare reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.

Flare provided the customer names for the interviews but did not participate in the interviews.

Consulting Team:

Lori Heckmann

Published

July 2025