A Forrester Total Economic Impact™ Study Commissioned By SecurityScorecard, May 2024
SecurityScorecard’s cyber risk platform offers a continuous attack surface and vendor monitoring and provides real-time data on third-party threats. Its comprehensive and automatic vendor detection, risk identification, and mitigation features enable enterprises to manage their online risk exposure within the critical third-party space holistically. Its strong API capabilities and automation also help organizations avoid costly breaches and achieve significant efficiencies.
SecurityScorecard offers enterprises a platform to monitor and manage digital third-party, supply chain, and attack surface vulnerabilities. SecurityScorecard provides comprehensive vendor security solutions that continuously monitor supply chain cyber risk activity and provide vendor security ratings — which saves organizations considerable internal resources in vendor onboarding and monitoring tasks while enabling security engineering teams to proactively address cyber irregularities with individual vendors before third-party threats impact their digital ecosystems. Its automated threat intelligence feature also identifies and assesses organizations’ third-party cyber vulnerabilities to the edge of their vendor networks and remediates these threats in real time, avoiding disruptive and impactful data breaches.
SecurityScorecard commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying its solutions.1 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SecurityScorecard on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four representatives with experience using SecurityScorecard. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization which is a US-based Fortune 500 organization with $50 billion in annual revenue, has 100,000 employees, and there are 20 FTEs on its security engineering team. The composite organization subscribes to SecurityScorecard’s security questionnaires and ratings services and additional platform features such as third-party cyber risk management, vulnerability intelligence, and attack surface management.
has $0 in annual revenue and a security engineering team of 0 FTEs. Custom results are based on your inputs and the TEI case study.
Interviewees said that prior to using SecurityScorecard, their organizations relied on external security reports and employed manual vendor onboarding and monitoring processes to assess, address, and remediate cyber risk within their vendor networks. These methods proved time-consuming and ineffective as external reports were often outdated. The organizations lacked the internal resources to scale and manage their entire vendor networks, leaving them vulnerable to undetected digital supply chain threats.
After the investment in SecurityScorecard, the interviewees reported their ability to better monitor and manage a much wider group of IT vendors and respond to third-party threats in a timely manner. As SecurityScorecard’s platform improved security hygiene, the organizations identified threatening cyber-attack vectors and intercepted attacks such as credential theft, phishing, and ransomware, thereby improving overall IT security postures.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
For , this cost could be over three years.
For , this cost could be over three years.
The representative interviews and financial analysis found that a composite organization experiences benefits of $6 million over three years versus costs of $2.2 million, adding up to a net present value (NPV) of $3.9 million and an ROI of 176%.
could experience benefits of over three years versus costs of , adding up to an NPV of and an ROI of 0%.
Return on investment (ROI)
Benefits PV
Net present value (NPV)
Payback
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in SecurityScorecard’s platform and solutions.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that SecurityScorecard can have on an organization.
Interviewed SecurityScorecard stakeholders and Forrester analysts to gather data relative to the SecurityScorecard platform.
Interviewed four representatives at organizations using the SecurityScorecard platform to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by SecurityScorecard and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in SecurityScorecard. For the interactive functionality using Configure Data/Custom Data, the intent is for the questions to solicit inputs specific to a prospect's business. Forrester believes that this analysis is representative of what companies may achieve with SecurityScorecard based on the inputs provided and any assumptions made. Forrester does not endorse SecurityScorecard or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, SecurityScorecard and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided ‘AS IS,’ and Forrester and SecurityScorecard make no warranties of any kind.
SecurityScorecard reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
SecurityScorecard provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Rachel Ballard
| Role | Industry | Region | Employees |
|---|---|---|---|
| Supply chain risk manager | Energy | Headquartered in Europe with global operations | 93,000 |
| Senior manager of cybersecurity | Banking | US | 217,000 |
| Senior director of information protection | Insurance | US | 74,000 |
| Senior director of information security | B2B distribution | US | 25,000 |
Interviewees commented that although their organizations previously purchased external vendor cyber assurance reports and employed security engineering resources to manage and monitor critical vendors, the reports were often untimely, and the security engineering team lacked the automation and bandwidth to onboard and monitor existing and new critical vendors. This inability to scale revealed deficiencies in their third-party and supply chain cyber risk management programs that exposed them to damaging attacks on their IT infrastructures. These third-party attacks, which sometimes shut down their networks for an indeterminable amount of time led to productivity loss, frustrated employees, and the loss of real-time online sales. Additionally, cybersecurity breaches originating from extended vendor networks — especially those involving data and credential theft — led to reputational damage, resulting in a loss of existing and future customers and a further loss of revenue.
The interviewees noted how their organizations struggled with common challenges, including:
The interviewees’ organizations searched for a solution that could:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the four interviewees, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The Fortune 500 organization is headquartered in the US with worldwide operations and reports $50 billion in annual revenue and 100,000 employees. In its legacy environment, the composite organization utilizes outdated risk assurance reports to assess vendor cyber risk and employs internal resources to onboard new critical vendors and monitor supply chain vulnerabilities and the organization’s exposure to external cyber threats and attacks.
Description of . has $0 in annual revenue and a security engineering team of 0 FTEs.
Deployment characteristics. The composite organization initially subscribes to SecurityScorecard’s traditional questionnaire and ratings services, and following a six-month evaluation and adoption period, deploys additional automated, AI-driven features offered on SecurityScorecard’s platform, including third-party cyber risk management, threat intelligence, and ASI.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Avoided security engineer hires for third-party risk management and monitoring | $789,327 $789,327 | $1,578,654 $1,578,654 | $2,367,981 $2,367,981 | $4,735,962 $4,735,962 | $3,801,342 $3,801,342 |
| Btr | Strengthened third-party and supply chain security | $696,870 $696,870 | $696,870 $696,870 | $696,870 $696,870 | $2,090,610 $2,090,610 | $1,733,013 $1,733,013 |
| Ctr | Efficiencies in critical vendor onboarding | $202,350 $202,350 | $202,350 $202,350 | $202,350 $202,350 | $607,050 $607,050 | $503,215 $503,215 |
| Total benefits (risk-adjusted) | $1,688,547 $1,688,547 | $2,477,874 $2,477,874 | $3,267,201 $3,267,201 | $7,433,622 $7,433,622 | $6,037,570 $6,037,570 | |
Evidence and data. The interviewees reported that to complete the same third-party risk management and monitoring tasks now performed by SecurityScorecard, their organizations’ security engineering teams would have needed to be expanded considerably in the prior environment.
Modeling and assumptions. For the financial analysis, Forrester assumes the following about the composite organization:
Risks. The number of avoided security engineer hires can vary with:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $3.8 million.
For , with 0 critical vendors onboarded annually and the percent time dedicated to risk monitoring and management tasks totaling 0% for the security engineering team, each earning a salary of $0 per year, this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|
| A1 | Security engineers required to meet monitoring, vulnerability management, recertifications, and penetration testing needs of new critical vendors | Your organizationYour organization | 77 | 1414 | 2121 |
| A2 | Percentage of time dedicated to third-party risk management and monitoring | Your organizationYour organization | 85%85% | 85%85% | 85%85% |
| A3 | Average fully-burdened annual cost of a security engineer | Your organizationYour organization | $147,400 $147,400 | $147,400 $147,400 | $147,400 $147,400 |
| At | Avoided security engineer hires for third-party risk management and monitoring | A1*A2*A3 | $877,030 $877,030 | $1,754,060 $1,754,060 | $2,631,090 $2,631,090 |
| Risk adjustment | ↓10% | ||||
| Atr | Avoided security engineer hires for third-party risk management and monitoring (risk-adjusted) | $789,327 $789,327 | $1,578,654 $1,578,654 | $2,367,981 $2,367,981 | |
| Three-year total: $4,735,962 $4,735,962 | Three-year present value: $3,801,342 $3,801,342 | ||||
Evidence and data. Through the identification and mitigation of previously undetected vulnerabilities in their digital supply chains, interviewees noted that SecurityScorecard helped their organizations minimize their third-party risk exposure significantly, specifically those pertaining to network and surface attacks. By enhancing its cybersecurity hygiene within its vendor network, the organizations were able to successfully avoid network and system breaches.
Modeling and assumptions. For the financial analysis, Forrester assumes the following about the composite organization:
Risks. Strengthened third-party and supply chain security can vary with:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.7 million.
For , with annual revenue of $0 and 20% of breaches originating from third-party attacks, this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Likelihood of an enterprise organization experiencing at least one breach per year | Forrester Research | 89%89% | 89%89% | 89%89% | |
| B2 | Mean cumulative cost of third-party breaches for enterprise organizations | Forrester Research | $5,800,000 $5,800,000 | $5,800,000 $5,800,000 | $5,800,000 $5,800,000 | |
| B3 | Percentage of breaches originating from external third-party attacks | Forrester Research | 20%20% | 20%20% | 20%20% | |
| B4 | Annual risk exposure from external third-party attacks | B1*B2*B3 | $1,032,400 $1,032,400 | $1,032,400 $1,032,400 | $1,032,400 $1,032,400 | |
| B5 | Reduced risk of breaches from external third-party attacks with SecurityScorecard | Interviews | 75%75% | 75%75% | 75%75% | |
| Bt | Strengthened third-party and supply chain security | B4*B5 | $774,300 $774,300 | $774,300 $774,300 | $774,300 $774,300 | |
| Risk adjustment | ↓10% | |||||
| Btr | Strengthened third-party and supply chain security (risk-adjusted) | $696,870 $696,870 | $696,870 $696,870 | $696,870 $696,870 | ||
| Three-year total: $2,090,610 $2,090,610 | Three-year present value: $1,733,013 $1,733,013 | |||||
Evidence and data. Interviewees noted that SecurityScorecard’s automated solutions helped them achieve significant efficiencies in the onboarding of critical vendors. These efficiencies offered the organizations greater coverage within their supply chain as they could onboard and monitor a wider range of vendors that posed potential third-party cyber risk.
Modeling and assumptions. For the financial analysis, Forrester assumes the following about the composite organization:
Risks. Efficiencies in critical vendor onboarding can vary with:
Results. To account for these risks, Forrester adjusted this benefit downward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $503,000.
For , with 0 critical vendors onboarded annually, each requiring 0 hours to onboard at an hourly cost of $0, this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|
| C1 | Critical vendors onboarded annually | Your organizationYour organization | 200200 | 200200 | 200200 |
| C2 | Average time required to onboard a new critical vendor prior to SecurityScorecard (hours) | Your organizationYour organization | 2020 | 2020 | 2020 |
| C3 | Percentage of time saved onboarding new critical vendors | Interviews | 75%75% | 75%75% | 75%75% |
| C4 | Average time saved onboarding a new critical vendor (hours) | C2*C3 | 1515 | 1515 | 1515 |
| C5 | Average fully-burdened hourly cost of a security engineer | A3/2080 hours per year | $71 $71 | $71 $71 | $71 $71 |
| Ct | Efficiencies in critical vendor onboarding | C1*C4*C5 | $213,000 $213,000 | $213,000 $213,000 | $213,000 $213,000 |
| Risk adjustment | ↓5% | ||||
| Ctr | Efficiencies in critical vendor onboarding (risk-adjusted) | $202,350 $202,350 | $202,350 $202,350 | $202,350 $202,350 | |
| Three-year total: $607,050 $607,050 | Three-year present value: $503,215 $503,215 | ||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement SecurityScorecard solutions and later realize additional uses and business opportunities, including:
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Dtr | Fees to SecurityScorecard | $131,250 $131,250 | $346,500 $346,500 | $561,750 $561,750 | $777,000 $777,000 | $1,816,500 $1,816,500 | $1,494,278 $1,494,278 |
| Etr | Initial and ongoing costs | $398,853 $398,853 | $80,514 $80,514 | $119,280 $119,280 | $158,046 $158,046 | $756,693 $756,693 | $689,368 $689,368 |
| Total costs (risk-adjusted) | $530,103 $530,103 | $427,014 $427,014 | $681,030 $681,030 | $935,046 $935,046 | $2,573,193 $2,573,193 | $2,183,646 $2,183,646 | |
Evidence and data.
Modeling and assumptions. For the financial analysis, Forrester assumes the following about the composite organization:
Risks. Total fees to SecurityScorecard can vary with:
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of close to $1.5 million.
For , these costs may have a three-year, risk-adjusted total PV of . Please note that this is based on a high-level estimation and does not represent a quote. For more details, please contact SecurityScorecard.
The following table shows custom results for .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| D1 | Critical vendors monitored by SecurityScorecard | Your organizationYour organization | 100100 | 300300 | 500500 | 700700 | |
| D2 | Annual license cost of SecurityScorecard per critical vendor (includes platform and questionnaires) | Interviews | $1,025 $1,025 | $1,025 $1,025 | $1,025 $1,025 | $1,025 $1,025 | |
| D3 | Annual cost of ASI | Interviews | $22,500 $22,500 | $22,500 $22,500 | $22,500 $22,500 | $22,500 $22,500 | |
| Dt | Fees to SecurityScorecard | (D1*D2)+D3 | $125,000 $125,000 | $330,000 $330,000 | $535,000 $535,000 | $740,000 $740,000 | |
| Risk adjustment | ↑5% | ||||||
| Dtr | Fees to SecurityScorecard (risk-adjusted) | $131,250 $131,250 | $346,500 $346,500 | $561,750 $561,750 | $777,000 $777,000 | ||
| Three-year total: $1,816,500 $1,816,500 | Three-year present value: $1,494,278 $1,494,278 | ||||||
Evidence and data. The initial and ongoing costs of the interviewees’ organizations included the costs of the resources required to evaluate, test, and deploy SecurityScorecard, any required training, and the ongoing management of the adopted platform solutions.
Modeling and assumptions. For the financial analysis, Forrester assumes the following about the composite organization:
Risks. Total initial and ongoing costs can vary with:
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $690,000.
For , these costs may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| E1 | Security engineer FTEs required to evaluate and adopt SecurityScorecard | Your organizationYour organization | 55 | ||||
| E2 | Months required to evaluate and adopt SecurityScorecard | Interviews | 66 | ||||
| E3 | Average fully-burdened annual cost of a security engineer | A3 | $147,400 $147,400 | ||||
| E4 | Subtotal: Initial cost to evaluate and adopt SecurityScorecard | E1*(E2/12)*E3 | $368,500 $368,500 | ||||
| E5 | Security engineers who require initial and ongoing training | Your organizationYour organization | 2020 | 2020 | 2020 | 2020 | |
| E6 | Time required for initial and ongoing training (hours) | Interviews | 88 | 22 | 22 | 22 | |
| E7 | Average fully-burdened hourly cost of a security engineer | C5 | $71 $71 | $71 $71 | $71 $71 | $71 $71 | |
| E8 | Subtotal: Initial and ongoing training costs | E5*E6*E7 | $11,360 $11,360 | $2,840 $2,840 | $2,840 $2,840 | $2,840 $2,840 | |
| E9 | Security engineer FTEs required for ongoing management | Your organizationYour organization | 11 | 11 | 11 | ||
| E10 | Time per week required for ongoing management of SecurityScorecard platform (hours) | Interviews | 2020 | 3030 | 4040 | ||
| E11 | Average fully-burdened hourly cost of a security engineer | C5 | $71 $71 | $71 $71 | $71 $71 | ||
| E12 | Subtotal: Ongoing management costs | E9*(E10*52 weeks)*E11 | $73,840 $73,840 | $110,760 $110,760 | $147,680 $147,680 | ||
| Et | Initial and ongoing costs | E4+E8+E12 | $379,860 $379,860 | $76,680 $76,680 | $113,600 $113,600 | $150,520 $150,520 | |
| Risk adjustment | ↑5% | ||||||
| Etr | Initial and ongoing costs (risk-adjusted) | $398,853 $398,853 | $80,514 $80,514 | $119,280 $119,280 | $158,046 $158,046 | ||
| Three-year total: $756,693 $756,693 | Three-year present value: $689,368 $689,368 | ||||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($530,103)($530,103) | ($427,014)($427,014) | ($681,030)($681,030) | ($935,046)($935,046) | ($2,573,193)($2,573,193) | ($2,183,646)($2,183,646) |
| Total benefits | $0 $0 | $1,688,547 $1,688,547 | $2,477,874 $2,477,874 | $3,267,201 $3,267,201 | $7,433,622 $7,433,622 | $6,037,570 $6,037,570 |
| Net benefits | ($530,103)($530,103) | $1,261,533 $1,261,533 | $1,796,844 $1,796,844 | $2,332,155 $2,332,155 | $4,860,429 $4,860,429 | $3,853,924 $3,853,924 |
| ROI | 176%176% | |||||
| Payback period (months) | <6<6 | |||||
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Benefits represent the value delivered to the business by the product. The TEI methodology places equal weight on the measure of benefits and the measure of costs, allowing for a full examination of the effect of the technology on the entire organization.
Costs consider all expenses necessary to deliver the proposed value, or benefits, of the product. The cost category within TEI captures incremental costs over the existing environment for ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. Having the ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
“Trends Report: Cybersecurity Risk Ratings Remain A Valuable Piece Of The Third-Party Risk Puzzle,” Forrester Research Inc., April 7, 2023.
1 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
2 Source: Forrester’s Security Survey, 2023; survey base involves 432 security decision-makers from organizations with a revenue of at least $1 billion with network, data center, app security, or security ops responsibilities who have experienced a breach in the past 12 months.
3 Source: Forrester’s Security Survey, 2023; survey base involves 72 security decision-makers from organizations with a revenue of at least $1 billion with network, data center, app security, or security ops responsibilities who have experienced a breach in the past 12 months.
4 Source: Forrester’s Security Survey, 2023; survey base involves 385 security decision-makers from organizations with a revenue of at least $1 billion with network, data center, app security, or security ops responsibilities who have experienced a breach in the past 12 months.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile
device when you visit the site. It enables the website to remember your actions (data inputs, website
navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to
another.
Behavioral information collected by our web analytics vendor is used to
analyze
data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We
may also use cookies or web beacons to help us offer you products, programs, or services that may be of
interest to you and to deliver relevant advertising. We may use third-party advertising companies to help
tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and
web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive
full functionality and enhance your experience. If you decline cookies, some features of the website may not
function normally.
Please see our
Privacy Policy for more information.