A Forrester Total Economic Impact™ Study Commissioned By ThreatLocker, February 2025
The market for cybersecurity solutions is growing, driven by the need for more robust security measures to address the increasing number of security threats and attacks. IT leaders are seeking comprehensive, Zero Trust endpoint security solutions that not only protect their organization’s networks but also provide visibility and control over their applications and infrastructure. With features like allowlisting and ringfencing, companies can proactively prevent threats and reduce breach risk and impact.
ThreatLocker secures an organization’s internal network using comprehensive, Zero Trust endpoint security through default-deny, allowlisting, and ringfencing capabilities. With ThreatLocker, leaders gain visibility into applications running in their systems, control over internal infrastructure, and capabilities to reduce security breach risk and effectiveness.
ThreatLocker commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying ThreatLocker.1 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of ThreatLocker on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed five decision-makers across four organizations with experience using ThreatLocker. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a multibillion-dollar, US-based, globally operated B2B organization.
Interviewees said that prior to using ThreatLocker, their organization experienced significant malware incidents and resource strain from previous security failures. Although interviewees evaluated alternative solutions, including other allowlisting features, they found them difficult to manage across multiple clients. Manual checklisting, when attempted, was also time consuming and inefficient. These limitations led to lack of visibility into applications running on the system, vulnerability to major security breaches, and disruption to business.
After the investment in ThreatLocker, the interviewees had no data security incidents. They experienced better data visibility, improved security postures, improved compliance, and increased productivity for their security operations teams. Key results from the investment included reduced risk of data breaches, enhanced security operations efficiencies, and avoided licensing costs.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
The representative interviews and financial analysis found that a composite organization experiences benefits of $6.41M over three years versus costs of $2.26M, adding up to a net present value (NPV) of $4.15M and an ROI of 184%.
Return on investment (ROI)
Benefits PV
Net present value (NPV)
Payback
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in ThreatLocker.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that ThreatLocker can have on an organization.
Interviewed ThreatLocker stakeholders and Forrester analysts to gather data relative to ThreatLocker.
Interviewed five people at four organizations using ThreatLocker to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by ThreatLocker and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in ThreatLocker.
ThreatLocker reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
ThreatLocker provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Nahida S. Nisa
| Role | Industry | Revenue | Deployed Endpoints |
|---|---|---|---|
| Chief executive officer | IT & cybersecurity managed services | $5.5M | 40 |
| Chief information security officer Director of cybersecurity |
Transportation | $9.6B | 11,000 |
| IT manager | Finance | $2.6B | 600 |
| Global information security manager | Agribusiness | $9B | 2,500 internally and across 95% of affiliates |
Prior to ThreatLocker, several interviewees’ organizations experienced security incidents that consumed significant resources, strained their lean teams, and ultimately catalyzed their decision to consider a default-deny solution. Some interviewees experienced temporary user productivity losses that locked users out of their applications and negatively impacted business when previous security solutions failed to detect malware. For others, compliance requirements drove the need for an application allowlisting solution.
The interviewees noted their organization’s struggles with common challenges, including:
The interviewees’ organizations searched for a solution that could:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The US-based, multibillion-dollar B2B organization operates globally. Its 10,000 employees each have a desktop or laptop computer. The organization has an existing security platform with an antivirus/EDR solution.
Deployment characteristics. The composite organization deploys ThreatLocker across 10,000 endpoints after a one-month proof of concept and a three-month implementation period. A team of 10 security analysts supports the tool, and all end users are trained in the change management process.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Reduced risk of data breach | $1,633,130 | $1,633,130 | $1,633,130 | $4,899,389 | $4,061,352 |
| Btr | Security operations efficiencies | $459,680 | $459,680 | $459,680 | $1,379,040 | $1,143,156 |
| Ctr | Licensing cost avoidance | $297,458 | $594,915 | $594,915 | $1,487,288 | $1,209,050 |
| Total benefits (risk-adjusted) | $2,390,267 | $2,687,725 | $2,687,725 | $7,765,716 | $6,413,558 | |
Evidence and data. Interviewees highlighted the biggest benefit of ThreatLocker as its default-deny policy. This policy ensures that only trusted applications can run, which significantly reduces the risk of unauthorized software execution. Most interviewees adopted ThreatLocker after experiencing costly security incidents with alternative security solutions, and all four interviewees reported no ransomware or malware incidents after deploying ThreatLocker.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. Results may not be representative of all experiences and the benefit will vary based on the following variables:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $4.1 million.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Likelihood of experiencing one or more breaches per year | Forrester research | 68% | 68% | 68% | |
| A2 | Percentage of breaches from internal incidents or from external attacks targeting the organization or its remote network | Forrester research | 81% | 81% | 81% | |
| A3 | Reduction in security incidents addressable with ThreatLocker | Interviews | 99% | 99% | 99% | |
| A4 | Mean cumulative cost of breaches | Forrester research | $3,010,000 | $3,010,000 | $3,010,000 | |
| A5 | Subtotal: Reduced exposure to security breaches with ThreatLocker | A1*A2*A3*A4 | $1,641,329 | $1,641,329 | $1,641,329 | |
| A6 | Cyber insurance policy cost | Composite | $2,800,000 | $2,800,000 | $2,800,000 | |
| A7 | Cyber insurance policy rate reduction due to allowlisting with ThreatLocker | Interviews | 10% | 10% | 10% | |
| A8 | Subtotal: Cyber insurance policy cost savings with ThreatLocker | A6*A7 | $280,000 | $280,000 | $280,000 | |
| At | Reduced risk of data breach | A5+A8 | $1,921,329 | $1,921,329 | $1,921,329 | |
| Risk adjustment | ↓15% | |||||
| Atr | Reduced risk of data breach (risk-adjusted) | $1,633,130 | $1,633,130 | $1,633,130 | ||
| Three-year total: $4,899,389 | Three-year present value: $4,061,352 | |||||
Evidence and data. Interviewees noted that ThreatLocker reduced the burden on their IT teams, minimizing the time spent on audits, routine maintenance, and manual reviews, as well as reducing the need for constant monitoring and intervention.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. Results may not be representative of all experiences and the benefit will vary based on the following variables:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.1 million.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Cyber security team FTEs | Composite | 10 | 10 | 10 | |
| B2 | Labor efficiencies gained from reduced time on routine maintenance, auditing access, cleanup, and detection and response | Interviews | 50% | 50% | 50% | |
| B3 | Average fully burdened hourly rate for a security analyst | Composite | $65 | $65 | $65 | |
| B4 | Productivity recapture | TEI standard | 80% | 80% | 80% | |
| Bt | Security operations efficiencies | B1*B2*B3*B4*2080 hours | $540,800 | $540,800 | $540,800 | |
| Risk adjustment | ↓15% | |||||
| Btr | Security operations efficiencies (risk-adjusted) | $459,680 | $459,680 | $459,680 | ||
| Three-year total: $1,379,040 | Three-year present value: $1,143,156 | |||||
Evidence and data. Interviewees used ThreatLocker for proactive threat prevention combined with other reactive tools, some of which they were able to decommission after deploying ThreatLocker.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. Results may not be representative of all experiences and the benefit will vary based on the following variables:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.2 million.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Third-party licenses replaced with ThreatLocker | Composite | 10,000 | 10,000 | 10,000 | |
| C2 | Percentage of legacy savings realized | Composite | 50% | 100% | 100% | |
| C3 | Cost avoided per license | Interviews | $70 | $70 | $70 | |
| Ct | Licensing cost avoidance | C1*C2*C3 | $350,000 | $700,000 | $700,000 | |
| Risk adjustment | ↓15% | |||||
| Ctr | Licensing cost avoidance (risk-adjusted) | $297,458 | $594,915 | $594,915 | ||
| Three-year total: $1,487,500 | Three-year present value: $1,209,229 | |||||
Interviewees mentioned the following additional benefits that their organization experienced but were not able to quantify:
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement ThreatLocker and later realize additional uses and business opportunities, including:
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Dtr | Enterprise license fees | $0 | $424,200 | $424,200 | $424,200 | $1,272,600 | $1,054,923 |
| Etr | Implementation and ongoing management | $394,240 | $37,180 | $37,180 | $37,180 | $505,780 | $486,701 |
| Ftr | Training costs | $697,950 | $8,580 | $8,580 | $8,580 | $723,690 | $719,287 |
| Total costs (risk-adjusted) | $1,092,190 | $469,960 | $469,960 | $469,960 | $2,502,070 | $2,260,911 | |
Evidence and data. Interviewees’ licensing costs for ThreatLocker varied depending on organization size and endpoints deployed. Pricing is per license per year and can be reduced with unified pricing for all products. Contact ThreatLocker for additional details.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. Results may not be representative of all experiences and the benefit will vary based on the following variables:
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.1 million.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| D1 | License fee per endpoint | Composite | $40.40 | $40.40 | $40.40 | ||
| D2 | Endpoint licenses | Composite | 10,000 | 10,000 | 10,000 | ||
| Dt | Enterprise license fees | D1*D2 | $404,000 | $404,000 | $404,000 | ||
| Risk adjustment | ↑5% | ||||||
| Dtr | Enterprise license fees (risk-adjusted) | $0 | $424,200 | $424,200 | $424,200 | ||
| Three-year total: $1,272,600 | Three-year present value: $1,054,923 | ||||||
Evidence and data. Overall, interviewees described the implementation process with ThreatLocker as quick and easy due to automation, ease of integration, and effective support from the ThreatLocker team. For most interviewees, the initial proof of concept phase took roughly four weeks with full deployment finalized in three to four months.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. Results may not be representative of all experiences and the benefit will vary based on the following variables:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $487,000.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| E1 | FTEs involved in implementation (proof of concept, policy, baselining, and rollout) | Composite | 4 | ||||
| E2 | Average fully burdened hourly rate per FTE (one business leader, one IT analyst, and two security analysts) | Composite | $200 | ||||
| E3 | Weeks spent on implementation | Interviews | 16 | ||||
| E4 | Percentage of time allocated to implementation | Interviews | 70% | ||||
| E5 | Average fully burdened hourly rate for a security analyst | Composite | $65 | $65 | $65 | ||
| E6 | FTEs involved in ongoing maintenance (upgrades and onboarding new user systems or applications) | Interviews | 1 | 1 | 1 | ||
| E7 | Percentage of time dedicated to ongoing maintenance | Interviews | 25% | 25% | 25% | ||
| Et | Implementation and ongoing management | E1*E2*E3*E4*40 hours per week + E5*E6*E7*2080 hours per year | $358,400 | $33,800 | $33,800 | $33,800 | |
| Risk adjustment | ↑10% | ||||||
| Etr | Implementation and ongoing management (risk-adjusted) | $394,240 | $37,180 | $37,180 | $37,180 | ||
| Three-year total: $505,780 | Three-year present value: $486,701 | ||||||
Evidence and data. Interviewees described making additional resources available for education and internal development. Organizations allocated time for their security operations team to participate in online training through ThreatLocker University to stay current on features, functionalities, and security trends.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. Results may not be representative of all experiences and the benefit will vary based on the following variables:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $719,000.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| F1 | End users with workstations using ThreatLocker | Composite | 10,000 | ||||
| F2 | Average fully burdened hourly rate for an end user | Composite | $55 | ||||
| F3 | Hours per webinar training | Interviews | 1 | ||||
| F4 | Security analysts | Composite | 10 | 10 | 10 | 10 | |
| F5 | Average fully burdened hourly rate for a security analyst | Composite | $65 | $65 | $65 | $65 | |
| F6 | Training hours for IT team | Interviews | 130 | 12 | 12 | 12 | |
| Ft | Training costs | F4*F5*F6+F1*F3*F2 | $634,500 | $7,800 | $7,800 | $7,800 | |
| Risk adjustment | ↑10% | ||||||
| Ftr | Training costs (risk-adjusted) | $697,950 | $8,580 | $8,580 | $8,580 | ||
| Three-year total: $723,690 | Three-year present value: $719,287 | ||||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($1,092,190) | ($469,960) | ($469,960) | ($469,960) | ($2,502,070) | ($2,260,911) |
| Total benefits | $0 | $2,390,267 | $2,687,725 | $2,687,725 | $7,765,717 | $6,413,558 |
| Net benefits | ($1,092,190) | $1,920,307 | $2,217,765 | $2,217,765 | $5,263,647 | $4,152,647 |
| ROI | 184% | |||||
| Payback | 7 months | |||||
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.
Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
Related Forrester Research
The State Of Data Security, 2024, Forrester Research, Inc., July 1, 2024.
The Devastating Business Impacts of a Cyber Breach, Harvard Business Review, May 4, 2023.
1Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
2 Source: Forrester's Security Survey, 2024. Base: 483 security decision-makers in North America who have experienced a breach in the past 12 months. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.
https://mainstayadvisor.com/go/mainstay/gdpr/policy.html