A Forrester Total Economic ImpactTM Study Commissioned By Palo Alto Networks, November 2023
As network architecture becomes more complex, security teams increasingly struggle to adapt and provide consistent security to all devices and data traversing their networks and clouds. Forrester research found IoT devices to be the most common target of external attacks . Subscription-based security services are a growing piece of most organizations’ security strategies, enabling rapid scalability of protection with up-to-the-minute updates and simplifying the deployment and management of security.
Palo Alto Networks Cloud-Delivered Security Services (CDSS) is a set of solutions that offer specialized security depending on different use cases and are designed to defend against known, unknown, and advanced evasive threats. The different solutions include Advanced Threat Prevention, Advanced WildFire, Advanced URL Filtering, DNS Security, Enterprise IoT Security, SaaS Security, and Enterprise DLP.
Palo Alto Networks commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying its CDSS.1 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of its CDSS on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four representatives with experience using Palo Alto Networks CDSS. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a distributed enterprise with 50,000 employees and $7 billion in annual revenue.
Prior to deploying Palo Alto Networks for network security needs, the customers leveraged various point solutions to secure their environments. The organizations lacked modern security technology as security and IT teams tried to keep up with evolving business needs. Digital transformation initiatives pushed more data, applications, and processes to the cloud, while other core business functions remained on-premises. Adding to the complexity was the need for the organizations to support more flexible and remote work options for their employees as employee expectations and other environmental factors drove up demand for remote access to critical applications and data. This piecemeal approach left organizations with many different vendors in their security stacks, making it challenging for security operations (SecOps) teams to integrate technologies, benefit from analytics, apply consistent policies, and deliver a consistent experience to end users.
Additionally, the lack of a unified platform and next-generation firewall capabilities left the organizations stuck in a cycle of devoting valuable resources to management, operations, and maintenance activities while work on new initiatives and enhancements fell by the wayside.
After the investment in Palo Alto Networks CDSS, the customers were able to realize various operational efficiencies across different activities, which significantly reduced investigational effort and freed up valuable resources to focus on enhancements and securing more of the network.
Key results from the investment are highlighted by efficiency gains for IT, security, and networks operations teams; business end users; and in-store workers. Further, interviewees’ organizations benefited from a reduced likelihood of a data breach, as well as reduced costs associated with licensing and managing legacy point-solution infrastructure.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
The representative interviews and financial analysis found that a composite organization experiences benefits of $12.85M over three years versus costs of $2.81M, adding up to a net present value (NPV) of $10.04M and an ROI of 357%.
Return on investment (ROI):
Benefits PV:
Net present value (NPV):
Payback:
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in Palo Alto Networks CDSS.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Palo Alto Networks CDSS can have on an organization.
Forrester Consulting conducted an online survey of 351 cybersecurity leaders at global enterprises in the US, the UK, Canada, Germany, and Australia. Survey participants included managers, directors, VPs, and C-level executives who are responsible for cybersecurity decision-making, operations, and reporting. Questions provided to the participants sought to evaluate leaders' cybersecurity strategies and any breaches that have occurred within their organizations. Respondents opted into the survey via a third-party research panel, which fielded the survey on behalf of Forrester in November 2020.
Interviewed Palo Alto Networks stakeholders and Forrester analysts to gather data relative to Palo Alto Networks CDSS.
Interviewed four representatives at organizations using Palo Alto Networks CDSS to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by Palo Alto Networks and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in PANW CDSS.
Palo Alto Networks reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
Palo Alto Networks provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Adi Sarosa
Isabel Carey
| Role | Industry | Annual Revenue | Employees |
|---|---|---|---|
| Director, security architecture and engineering | Manufacturing | $17 billion | 160,000 |
| SVP, IT | Financial services | $3.2 billion | 3,000 |
| Enterprise network architect | Government | $16 billion | 400,000 |
| Information security architect and CISO | Healthcare | $2.2 billion | 11,000 |
Prior to using Palo Alto Networks, interviewees shared that they used a myriad of security point solutions and services designed to address specific needs. They would often work with different vendors for different solutions. They would have to spend time and resources of their SecOps and IT ops teams to manage the different platforms, which created a significant technical burden and operational inefficiencies.
The interviewees noted how their organizations struggled with common challenges, including:
Additionally, interviewees also noted some pain points specifically related to their need for Palo Alto Networks CDSS, such as:
The interviewees’ organizations searched for a solution that could:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the four interviewees, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The composite organization is a distributed enterprise with 50,000 employees and $7 billion in annual revenue. It has 400 sites, including its headquarters, data center, cloud, branch office, and retail and manufacturing locations. On average, the composite’s security team responds to 1,200 incidents per week, or 62,400 in the first year, with each incident taking an average of 2 hours to resolve.
Deployment characteristics. The organization uses Palo Alto Networks CDSS to supplement each NGFW deployment (physical, virtual, cloud-delivered) with 24/7 monitoring of all vulnerabilities (Threat Prevention), all web-borne threats (Advanced URL Filtering, DNS Security, and Strata SaaS), and all file-based threats (Advanced WildFire), providing protection against zero-day threats for all threat vectors with inline machine learning (ML) and updates delivered in seconds or less. The organization deploys Enterprise IoT Security to monitor and secure expanding device risk from IoT.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Security and IT operations efficiency | $311,666 | $488,555 | $580,617 | $1,380,838 | $1,123,323 |
| Btr | End-user productivity gain | $2,084,940 | $2,084,940 | $2,084,940 | $6,254,820 | $5,184,937 |
| Ctr | Data breach risk reduction | $1,119,360 | $1,119,360 | $1,119,360 | $3,358,080 | $2,783,683 |
| Dtr | Security infrastructure cost reduction and avoidance | $1,360,000 | $1,360,000 | $1,360,000 | $4,080,000 | $3,382,119 |
| Etr | Security stack management efficiency from common platform | $151,875 | $151,875 | $151,875 | $455,625 | $377,691 |
| Total benefits (risk-adjusted) | $5,027,841 | $5,204,730 | $5,296,792 | $15,529,363 | $12,851,753 |
Evidence and data. Interviewees shared with Forrester that by moving to Palo Alto Networks CDSS, they were able to realize time savings and efficiencies among their security and IT operations teams. Through the different Palo Alto Networks solutions, interviewees noted that their organizations were able to introduce automation and repeatable templates in their process, which saved time in doing certain activities.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact benefit realized by an organization may depend on:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1,123,323.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Security incidents requiring manual investigation/remediation using legacy security solution | Composite | 62,400 | 65,520 | 68,796 | |
| A2 | Reduction in security incidents requiring manual investigation/remediation with Palo Alto Networks | Interviews | 25% | 50% | 60% | |
| A3 | Manual multitouch security incidents avoided | A1*A2 | 15,600 | 32,760 | 41,278 | |
| A4 | MTTR with prior solution (minutes) | Composite | 120 | 120 | 120 | |
| A5 | Subtotal: Time savings due to avoided investigations with Palto Alto Networks | A3*A4/60*A8 | $1,809,600 | $3,800,160 | $4,788,248 | |
| A6 | MTTR improvement with PANW | Interviews | 20% | 20% | 20% | |
| A7 | Minutes saved per incident | A4*A6 | 24 | 24 | 24 | |
| A8 | Average fully burdened hourly salary of involved employee | TEI standard | $58 | $58 | $58 | |
| A9 | Subtotal: SecOps efficiency related to critical alerts due to Palto Alto Networks | ((A1-A3)*A7/60)*A8*A15) | $1,085,760 | $760,032 | $638,418 | |
| A10 | Endpoint devices requiring reimaging or other services (annually) | Composite | 2,600 | 2,600 | 2,600 | |
| A11 | Time spent per device with legacy solution (minutes) | Composite | 45 | 45 | 45 | |
| A12 | Reduction in number of endpoint devices requiring reimaging with Palto Alto Networks | Interviews | 50% | 50% | 50% | |
| A13 | Average fully burdened hourly salary of involved employee | TEI standard | $39 | $39 | $39 | |
| A14 | Subtotal: Reduced IT effort — reimaging | ((A10*A11)/60)*A12*A13 | $37,969 | $37,969 | $37,969 | |
| A15 | Attribution to CDSS | Composite | 25% | 25% | 25% | |
| A16 | Productivity recapture for security FTE | TEI standard | 50% | 50% | 50% | |
| At | Security and IT operations efficiency | (A5+A9+A14)*A15*A16 | $366,666 | $574,770 | $683,079 | |
| Risk adjustment | ↓15% | |||||
| Atr | Security and IT operations efficiency (risk-adjusted) | $311,666 | $488,555 | $580,617 | ||
| Three-year total: $1,380,838 | Three-year present value: $1,123,323 | |||||
Evidence and data. Interviewees noted that prior to using Palo Alto Networks, their previous security environment sometimes disrupted work done by business and end users. This could be through investigation procedures that were too disruptive; other times, security gaps that existed in their legacy environment caused cybersecurity attacks that could significantly disrupt employee productivity.
By moving to Palo Alto Networks, specifically, certain CDSS such as Enterprise IoT Security or Advanced Threat Prevention, interviewees shared that activities such as vulnerability scanning are no longer too invasive. For tools that protect remote workers, they could now ensure that all end users have the same experience regardless of their location. As a result of all the prevented disruption, end users realized improved productivity.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact benefit realized by an organization may depend on:
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $5,184,937.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Number of employees | Composite | 50,000 | 50,000 | 50,000 | |
| B2 | Percentage of end users with work directly relating cloud products | Composite | 45% | 45% | 45% | |
| B3 | Percentage of end users impacted by system downtime | TEI standard | 10% | 10% | 10% | |
| B4 | Percentage of time recapture due to better availability / less downtime | Interviews | 8% | 8% | 8% | |
| B5 | Average salary - business user (annual) | TEI standard | $87,750 | $87,750 | $87,750 | |
| B6 | Productivity recapture | TEI standard | 50% | 50% | 50% | |
| B7 | Attribution to CDSS | Composite | 33% | 33% | 33% | |
| Bt | End-user productivity gain | B1*B2*B3*B4*B5* B6*B7 | $2,606,175 | $2,606,175 | $2,606,175 | |
| Risk adjustment | ↓20% | |||||
| Btr | End-user productivity gain (risk-adjusted) | $2,084,940 | $2,084,940 | $2,084,940 | ||
| Three-year total: $6,254,820 | Three-year present value: $5,184,937 | |||||
Evidence and data. Interviewees shared that their organizations previously relied on point solutions that did not necessarily integrate well as an overall environment. This left potential security coverage gaps, even more so if their organization had a mix of on-premises and cloud environments.
With Palo Alto Networks, organizations had the visibility to easily identify and close these gaps. Palo Alto Networks CDSS further enhanced network security by providing 24/7 coverage and support, including automated updates to all NGFWs to protect against the latest threats.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact benefit realized by an organization may depend on:
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $2,783,683.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Average number of data breaches per year | Composite | 3.2 | 3.2 | 3.2 | |
| C2 | Total employees | B1 | $50,000 | $50,000 | $50,000 | |
| C3 | Average potential cost of data-breach per employee, exclusive of internal user downtime | Composite | $53 | $53 | $53 | |
| C4 | Average total potential cost of a data breach | C2*C3 | $2,650,000 | $2,650,000 | $2,650,000 | |
| C5 | Reduced likelihood of a breach | Interviews | 50% | 50% | 50% | |
| C6 | Attribution to CDSS | Composite | 33% | 33% | 33% | |
| Ct | Data breach risk reduction | C1*C4*C5*C6 | $1,399,200 | $1,399,200 | $1,399,200 | |
| Risk adjustment | ↓20% | |||||
| Ctr | Data breach risk reduction (risk-adjusted) | $1,119,360 | $1,119,360 | $1,119,360 | ||
| Three-year total: $3,358,080 | Three-year present value: $2,783,683 | |||||
Evidence and data. Interviewees shared that by using CDSS’s different solutions, they were able to realize cost savings by retiring or discontinuing parts of their security tech stack spending. Interviewees said their organizations found that once they implemented Palo Alto Networks’ infrastructure and CDSS, many of their legacy infrastructure and services became redundant and were outperformed by the unified Palo Alto Networks solution. Palo Alto Networks CDSS subscriptions supplanted most of the legacy services that interviewees relied on, allowing them to end those contracts and reduce the number of vendors and disparate systems in their environments.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact benefit realized by an organization may depend on:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $3,382,119.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| D1 | Annual security tech stack spend | Composite | $8,000,000 | $8,000,000 | $8,000,000 | |
| D2 | Percentage of savings from vendor consolidation related to CDSS | Interviews | 20% | 20% | 20% | |
| Dt | Security infrastructure cost reduction and avoidance | D1*D2 | $1,600,000 | $1,600,000 | $1,600,000 | |
| Risk adjustment | ↓15% | |||||
| Dtr | Security infrastructure cost reduction and avoidance (risk-adjusted) | $1,360,000 | $1,360,000 | $1,360,000 | ||
| Three-year total: $4,080,000 | Three-year present value: $3,382,119 | |||||
Evidence and data. Interviewees shared a number of efficiencies they were able to realize related to managing CDSS. For example, being able to reduce the number of vendors in their environments, in addition to realizing cost savings related to the vendor licensing cost described before, resulted in less-complex vendor and platform management work on the part of the IT organization staff. Added to the fact that all Palo Alto Networks’ solutions can be managed from a common platform resulted in significant time savings and efficiency gains that could be repurposed for other work across the organization.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact benefit realized by an organization may depend on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $377,691.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| E1 | Team responsible for platform management | Composite | 15 | 15 | 15 | |
| E2 | Percentage of time savings due to common platform efficiency | Interviews | 50% | 50% | 50% | |
| E3 | Attribution to CDSS | Composite | 20% | 20% | 20% | |
| E4 | Average salary - IT org | TEI standard | $112,500 | $112,500 | $112,500 | |
| Et | Security stack management efficiency from common platform | E1*E2*E3*E4 | $168,750 | $168,750 | $168,750 | |
| Risk adjustment | ↓10% | |||||
| Etr | Security stack management efficiency from common platform (risk-adjusted) | $151,875 | $151,875 | $151,875 | ||
| Three-year total: $455,625 | Three-year present value: $377,691 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
The information security architect and CISO in healthcare added, “The visibility of the IoT tool in terms of usage helps the purchasing and supply organization when they would get requests from the clinical engineering team about needing new equipment”
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement CDSS and later realize additional uses and business opportunities, including:
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Ftr | Installation and deployment costs | $558,900 | $163,013 | $100,913 | $69,863 | $892,688 | $842,981 |
| Gtr | Internal time investment for user training and ongoing management | $950 | $24,948 | $24,948 | $24,948 | $75,794 | $62,992 |
| Htr | CDSS subscription and services costs | $0 | $766,570 | $766,570 | $766,570 | $2,299,710 | $1,906,346 |
| Total costs (risk-adjusted) | $559,850 | $954,531 | $892,431 | $861,381 | $3,268,192 | $2,812,319 |
Evidence and data. Interviewees noted that the installation and deployment process of Palo Alto Networks CDSS depended on the exact solution implemented, by largely including analyzing the current environment where the solution will be implemented, setting up the solution, and making adjustments, especially if there were specific needs or use cases at the implementing organization.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact cost incurred by an organization may depend on:
Results. To account for these risks, Forrester adjusted this cost upward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $842,981.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| F1 | Network team working on PANW installation | Composite | 10 | 10 | 10 | 10 | |
| F2 | Time spent per staff | Interviews | 80% | 40% | 20% | 10% | |
| F3 | Annual salary: NetOps employee | Forrester standard | $135,000 | $135,000 | $135,000 | $135,000 | |
| F4 | Percentage work time necessary to deploy CDSS | Interviews | 20% | 20% | 20% | 20% | |
| F5 | Implementation labor for CDSS software and subscriptions | F1*F2*F3*F4 | $216,000 | $108,000 | $54,000 | $27,000 | |
| F6 | IoT deployment team | Composite | 8 | 2 | 2 | 2 | |
| F7 | Time spent per staff | Interviews | 25% | 12.5% | 12.5% | 12.5% | |
| F9 | Implementation and fine-tuning labor for IoT security deployment | F6*F7*F8 | $270,000 | $33,750 | $33,750 | $33,750 | |
| Ft | Installation and deployment costs | F5+F9 | $486,000 | $141,750 | $87,750 | $60,750 | |
| Risk adjustment | ↑15% | ||||||
| Ftr | Installation and deployment costs (risk-adjusted) | $558,900 | $163,013 | $100,913 | $69,863 | ||
| Three-year total: $892,688 | Three-year present value: $842,981 | ||||||
Evidence and data. Interviewees noted that ongoing management was relatively easy for their team. Additionally, the training resources that Palo Alto Networks provided were effective and gave employees the tools and knowledge they needed to be successful working across the various products and solutions.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact cost incurred by an organization may depend on:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $62,992.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| G1 | Number of FTEs receiving training for ongoing management | Composite | 10 | 10 | 10 | 10 | |
| G2 | Number of hours per training session | Interviews | 8 | 2 | 2 | 2 | |
| G3 | Average hourly salary: IT org employee (SecOps, NetOps, IT operations) | Forrester standard | $54 | $54 | $54 | $54 | |
| G4 | Internal time investment for user training | G1*G2*G3 | $4,320 | $1,080 | $1,080 | $1,080 | |
| G5 | Percentage of time spent for ongoing management | Interviews | 10% | 10% | 10% | ||
| G6 | Value of internal time investment for ongoing management | G1*G4*2080 hours*G5 | $112,320 | $112,320 | $112,320 | ||
| G7 | Attribution to CDSS | E3 | 20% | 20% | 20% | 20% | |
| Gt | Internal time investment for user training and ongoing management | (G4+G6)*G7 | $864 | $22,680 | $22,680 | $22,680 | |
| Risk adjustment | ↑10% | ||||||
| Gtr | Internal time investment for user training and ongoing management (risk-adjusted) | $950 | $24,948 | $24,948 | $24,948 | ||
| Three-year total: $75,794 | Three-year present value: $62,992 | ||||||
Evidence and data. CDSS cost and structure vary by type and usage and are often connected to the NGFW deployment. Interviewees shared that their Palo Alto Networks solution could also be purchased with credits that could be used on different solutions.
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The exact cost incurred by an organization may depend on:
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1,906,346.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| H1 | CDSS subscription and services costs | PAN | 0 | $730,067 | $730,067 | $730,067 | |
| Ht | CDSS subscription and services costs | H1 | $0 | $730,067 | $730,067 | $730,067 | |
| Risk adjustment | ↑5% | ||||||
| Htr | CDSS subscription and services costs (risk-adjusted) | $0 | $766,570 | $766,570 | $766,570 | ||
| Three-year total: $2,299,710 | Three-year present value: $1,906,346 | ||||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($559,850) | ($954,531) | ($892,431) | ($861,381) | ($3,268,192) | ($2,812,319) |
| Total benefits | $0 | $5,027,841 | $5,204,730 | $5,296,792 | $15,529,363 | $12,851,753 |
| Net benefits | ($559,850) | $4,073,311 | $4,312,299 | $4,435,412 | $12,261,171 | $10,039,434 |
| ROI | 357% | |||||
| Payback period (months) | <6 |
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Benefits represent the value delivered to the business by the product. The TEI methodology places equal weight on the measure of benefits and the measure of costs, allowing for a full examination of the effect of the technology on the entire organization.
Costs consider all expenses necessary to deliver the proposed value, or benefits, of the product. The cost category within TEI captures incremental costs over the existing environment for ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. Having the ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
Related Forrester Research
“The Future Of Cybersecurity And Privacy,” Forrester Research, Inc., August 3, 2023
“Top Cybersecurity Threats In 2023,” Forrester Research, Inc., April 17, 2023.
APPENDIX C: ENDNOTES
1 Source: “The State Of IoT Security, 2023,” Forrester Research, Inc., May 18, 2023.
2 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
3 Forrester Consulting Cost Of A Cybersecurity Breach Survey, Q1 2021.
4 “The Future Of Cybersecurity And Privacy,”Forrester Research, Inc., August 3, 2023.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.