A Forrester Total Economic Impact™ Study Commissioned By Axonius, March 2025
Security and risk (S&R) professionals have long recognized the need to be proactive to prevent breaches, yet many remain stuck in reactive mode. Effective proactive security comes down to great data management, which is hindered by an overabundance of data sources and teams’ inability to sort through the noise. Proactive security teams must organize their approach to managing security data so they can effectively gain visibility, accurately prioritize, and communicate and track remediations across the organization.1
Axonius enables total visibility and actionability over the end-to-end lifecycle of every type of technology asset. The product portfolio helps security, IT, and governance, risk, and compliance (GRC) teams preemptively tackle hard-to-spot exposures, misconfigurations, and operational challenges across their entire technology footprint — backed by a comprehensive asset data model. The Axonius Platform consists of five core products, including Cyber Assets, SaaS (software-as-a-service) Apps, Software Assets, Exposures, and Identities.
Axonius commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Axonius Cyber Assets.2 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Axonius Cyber Assets on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four decision-makers with experience using Axonius. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a global, multibillion-dollar, B2B, and B2C organization with 40,000 employees.
generates $0 in annual revenue, manages 0 assets in its current environment, spends 0 hours investigating assets impacted per security incident, and is expected to dedicate 0 SecOps FTEs to use Axonius for asset data and device management. Custom results are based on your inputs and the TEI case study.
Prior to Axonius, interviewees relied on spreadsheets and information from their configuration management databases (CMDBs) to inventory their assets. Information security teams dedicated manual effort to maintain an accurate inventory, which continued to prove challenging as their organizations’ attack surfaces grew increasingly large, dynamic, and complex. With siloed security tools that created blind spots, teams at the interviewees’ organizations lacked comprehensive insight into device security posture, which led them to primarily focus on securing their “crown jewels.” The interviewees’ organizations did not effectively ascertain their overall attack surface.
After unifying their asset data sources with Axonius, interviewees uncovered and classified more assets than tracked in their organizations’ prior environments. Overall visibility into their attack surfaces increased. With access to correlated asset data, customized user dashboards, and automations driven by the Enforcement Center, interviewees’ organizations accelerated their vulnerability management and incident response investigations. Axonius also automated other routine workflows across the organizations, including risk management and compliance reporting, M&A research, and the enrichment of their existing CMDB. These operational efficiencies and strengthened security policy configurations resulted in improved asset security, ultimately reducing the risk of a breach for the interviewees’ organizations.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
For , this benefit could be worth over three years.
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
For , this cost could be over three years.
For , this cost could be over three years.
The representative interviews and financial analysis found that a composite organization experiences benefits of $5.3 million over three years versus costs of $2.1 million, adding up to a net present value (NPV) of $3.2 million and an ROI of 156%.
Return on investment (ROI)
Benefits PV
Net present value (NPV)
Payback
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in the Axonius Cyber Assets product.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Axonius Cyber Assets can have on an organization.
Interviewed Axonius stakeholders and Forrester analysts to gather data relative to the platform.
Interviewed four people at organizations using Axonius to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by Axonius and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Axonius Cyber Assets. For the interactive functionality using Configure Data/Custom Data, the intent is for the questions to solicit inputs specific to a prospect’s business. Forrester believes that this analysis is representative of what companies may achieve with Axonius Cyber Assets based on the inputs provided and any assumptions made. Forrester does not endorse Axonius or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, Axonius and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided ‘AS IS,’ and Forrester and Axonius make no warranties of any kind.
Axonius reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
Axonius provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Sarah Lervold
Maria Kulikova
| Role | Industry | Revenue | Employees | Axonius Products Deployed | Assets Adapters |
|---|---|---|---|---|---|
| Lead attack surface management engineer | Transportation services | $13.0 billion | 100,000 | Cyber Assets | ~1 million 50 |
| CISO | Semiconductor manufacturing | $17.5 billion | 34,000 | Cyber Assets | 355,000 24 |
| Cloud security engineer | Financial services | $7.6 billion | 20,000 | Cyber Assets SaaS Apps |
552,000 54 |
| Staff security engineer | Retail | $4.3 billion | 25,000 | Cyber Assets | 120,000 38 |
The interviewees acknowledged that asset management was important but recognized their organizations had gaps in visibility across their increasingly complex environments. Prior to deploying Axonius, the majority of interviewees relied on configuration management databases (CMBD), spreadsheets, and internal information-sharing systems to inventory their assets. Some interviewees’ organizations built custom scripting on top of these inventory tools in an effort to unify dispersed data, but much of the effort required to maintain these tools was manual and time intensive.
As their organizations’ attack surfaces evolved and included more assets to manage, interviewees noted that their information security teams remained in reactive mode. These teams often operated in silos, using a particular set of security tools to address their immediate needs — there were no “tool of tools.” This led the interviewees’ organizations to focus on protecting and securing only their “crown jewel assets” rather than ascertaining their complete attack surface. As Forrester research states: “Growing and diverse attack surfaces create disjointed, siloed security solutions. Technology ownership is increasingly decentralized from IT, meaning a wider spread of deployments requires a rush to discover and secure it.”3
The interviewees noted how their organizations struggled with common challenges, including:
Manual effort required to maintain accurate asset inventory. Interviewees explained that their organizations’ IT and security teams actively maintained their inventory databases to trust they were accurate and up to date. These activities included, for example, monitoring and building custom scripting and ensuring asset scanners were working properly. This required time that otherwise could have been dedicated to more proactive security tasks defending their attack surface. The lead attack surface management engineer at the transportation services organization said: “We operate with [an extensive] number of assets. It is hard to actively maintain a comprehensive CMBD or a change database of all assets.”
The CISO at the manufacturing organization told Forrester: “One of the gaps that we knew we had was asset management. … We have a product our operations team uses but it’s never in sync, it’s never accurate. It always has problems. A lot of scripts kind of keep it coupled together.”
The interviewees’ organizations searched for a solution that could:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The composite is a public, multibillion-dollar organization that is business-to-consumer (B2C) and business-to-business (B2B). It has global operations, 40,000 employees, and a cybersecurity team with 75 employees.
Deployment characteristics. The composite organization connects 40 adapters to Axonius during initial implementation. It begins using Axonius Cyber Assets as well as the Enforcement Center feature in Year 1. The composite continues to connect additional adapters over time.
generates $0 in annual revenue, manages 0 assets in its current environment, spends 0 hours investigating assets impacted per security incident, and is expected to dedicate 0 SecOps FTEs to use Axonius for asset data and device management. Custom results are based on your inputs and the TEI case study.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Enhanced attack surface visibility | $570,326 $570,326 | $475,826 $475,826 | $520,376 $520,376 | $1,566,529 $1,566,529 | $1,302,690 $1,302,690 |
| Btr | Accelerated vulnerability management investigation | $432,851 $432,851 | $432,851 $432,851 | $432,851 $432,851 | $1,298,553 $1,298,553 | $1,076,436 $1,076,436 |
| Ctr | Accelerated incident response investigation | $839,808 $839,808 | $839,808 $839,808 | $839,808 $839,808 | $2,519,424 $2,519,424 | $2,088,478 $2,088,478 |
| Dtr | Automated risk management and compliance reporting | $33,696 $33,696 | $33,696 $33,696 | $33,696 $33,696 | $101,088 $101,088 | $83,797 $83,797 |
| Etr | Improved asset investigation workflows | $270,000 $270,000 | $270,000 $270,000 | $270,000 $270,000 | $810,000 $810,000 | $671,450 $671,450 |
| Ftr | Reduced risk of security breach | $25,403$25,403 | $25,403$25,403 | $25,403$25,403 | $76,210$76,210 | $63,174$63,174 |
| Total benefits (risk-adjusted) | $2,172,085$2,172,085 | $2,077,585$2,077,585 | $2,122,535$2,122,535 | $6,371,804$6,371,804 | $5,286,025$5,286,025 | |
Evidence and data. Forrester research states: “Gaining visibility is a continuous process of discovery. But once teams discover a new asset, they need to gather information about its context.”5 Interviewees explained how Axonius identified and classified significantly more assets (inclusive of networking devices, endpoints, user identities, and cloud assets) in their organizations’ environments than previously identified in their CMBD or manual spreadsheet tracking tools. After connecting their existing security tools to Axonius, their organizations gained a clear and accurate picture of their true attack surfaces. Through Axonius’ Enforcement Center, which enabled the interviewees’ organizations to take remediation action on assets, their teams saved significant time in maintaining accurate and real-time asset inventories. With improved visibility, interviewees also explained how their organizations were able to decommission asset licenses no longer in use, leading to cost savings:
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The size of this benefit may vary among organizations depending on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.3 million.
For , this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Assets identified in prior environment | CompositeComposite | 200,000200,000 | 220,000220,000 | 242,000242,000 | |
| A2 | Increase in assets identified with Axonius | InterviewsTEI case study | 150%150% | 150%150% | 150%150% | |
| A3 | Assets identified with Axonius | A1*(1+A2) | 500,000500,000 | 550,000550,000 | 605,000605,000 | |
| A4 | Newly identified/classified assets | A3-A1 | 300,000300,000 | 330,000330,000 | 363,000363,000 | |
| A5 | Percentage of newly identified/classified assets that are endpoints | A4*10% | 30,00030,000 | 33,00033,000 | 36,30036,300 | |
| A6 | Cost per endpoint license that was not previously decommissioned | AssumptionTEI case study | $50 $50 | $50 $50 | $50 $50 | |
| A7 | Percentage of licenses decommissioned annually | CompositeTEI case study | 40%40% | 30%30% | 30%30% | |
| A8 | Subtotal: Decommissioned endpoint licenses | A5*A6*A7 | $600,000 $600,000 | $495,000 $495,000 | $544,500 $544,500 | |
| A9 | Hours dedicated to inventory asset data and manage custom scripts in prior environment | CompositeComposite | 1,0401,040 | 1,0401,040 | 1,0401,040 | |
| A10 | Improvement with Axonius | InterviewsTEI case study | 60%60% | 60%60% | 60%60% | |
| A11 | Hours recaptured with Axonius | A9*A10 | 624624 | 624624 | 624624 | |
| A12 | Fully burdened hourly rate for a SecOps professional | CompositeTEI standard | $72 $72 | $72 $72 | $72 $72 | |
| A13 | Productivity recapture | TEI Methodology | 75%75% | 75%75% | 75%75% | |
| A14 | Subtotal: Asset inventory efficiencies | A11*A12*A13 | $33,696 $33,696 | $33,696 $33,696 | $33,696 $33,696 | |
| At | Enhanced attack surface visibility | A8+A14 | $633,696 $633,696 | $528,696 $528,696 | $578,196 $578,196 | |
| Risk adjustment | ↓10% | |||||
| Atr | Enhanced attack surface visibility (risk-adjusted) | $570,326 $570,326 | $475,826 $475,826 | $520,376 $520,376 | ||
| Three-year total: $1,566,529 $1,566,529 | Three-year present value: $1,302,690 $1,302,690 | |||||
Evidence and data. Interviewees explained their organizations’ increasing focus on adopting and establishing vulnerability management practices, particularly given the transition to more cloud-based workstreams. With Axonius, security teams at the interviewees’ organizations built custom dashboards in order to identify vulnerable assets and used queries to make risk-based decisions on how to assign priority to these assets. Interviewees explained that using Axonius to gather complete asset data rather than their vulnerability management tools saved significant time during investigations. Axonius also saved the interviewees’ organizations time when performing routine device compliance checks in order to get ahead of potential impacts from vulnerabilities.
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The size of this benefit may vary among organizations depending on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.1 million.
For , this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Critical vulnerabilities to investigate | CompositeScaled to A3 | 4848 | 4848 | 4848 | |
| B2 | Hours to manually investigate and prioritize impacted assets per vulnerability in prior environment | InterviewsTEI case study | 4040 | 4040 | 4040 | |
| B3 | Improvement with Axonius | Interviews | 70%70% | 70%70% | 70%70% | |
| B4 | SecOps resources | CompositeComposite | 55 | 55 | 55 | |
| B5 | Fully burdened hourly rate for a SecOps professional | CompositeTEI standard | $72 $72 | $72 $72 | $72 $72 | |
| B6 | Subtotal: Vulnerability management investigation efficiencies | B1*B2*B3*B4*B5 | $483,840 $483,840 | $483,840 $483,840 | $483,840 $483,840 | |
| B7 | Hours dedicated to device compliance identification and reporting in the prior environment | CompositeComposite | 156156 | 156156 | 156156 | |
| B8 | Improvement with Axonius | InterviewsTEI case study | 90%90% | 90%90% | 90%90% | |
| B9 | Subtotal: Device compliance identification efficiencies | B7*B8*B4*B5 | $50,544 $50,544 | $50,544 $50,544 | $50,544 $50,544 | |
| B10 | Productivity recapture | TEI Methodology | 90%90% | 90%90% | 90%90% | |
| Bt | Accelerated vulnerability management investigation | (B6+B9)*B10 | $480,946 $480,946 | $480,946 $480,946 | $480,946 $480,946 | |
| Risk adjustment | ↓10% | |||||
| Btr | Accelerated vulnerability management investigation (risk-adjusted) | $432,851 $432,851 | $432,851 $432,851 | $432,851 $432,851 | ||
| Three-year total: $1,298,553 $1,298,553 | Three-year present value: $1,076,436 $1,076,436 | |||||
Evidence and data. Aside from driving efficiencies for vulnerability management investigation, interviewees explained how Axonius played a role when responding to incidents. These incidents were events (but not material breaches) that triggered alerts for the security team to investigate. With enhanced visibility and an understanding of how to effectively query the asset data, interviewees noted that incident responders reduced the time required to investigate the assets impacted by these incidents and accurately determine whether the incident was a false positive or whether it required further remediation.
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The size of this benefit may vary among organizations depending on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $2.1 million.
For , this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Security incidents | CompositeComposite | 2,0002,000 | 2,0002,000 | 2,0002,000 | |
| C2 | Hours to investigate impacted assets during an incident in prior environment | InterviewsInterviews | 1212 | 1212 | 1212 | |
| C3 | Improvement with Axonius | InterviewsTEI case study | 60%60% | 60%60% | 60%60% | |
| C4 | Fully burdened hourly rate for a SecOps professional | CompositeTEI standard | $72 $72 | $72 $72 | $72 $72 | |
| C5 | Productivity recapture | TEI Methodology | 90%90% | 90%90% | 90%90% | |
| Ct | Accelerated incident response investigation | C1*C2*C3*C4*C5 | $933,120 $933,120 | $933,120 $933,120 | $933,120 $933,120 | |
| Risk adjustment | ↓10% | |||||
| Ctr | Accelerated incident response investigation (risk-adjusted) | $839,808 $839,808 | $839,808 $839,808 | $839,808 $839,808 | ||
| Three-year total: $2,519,424 $2,519,424 | Three-year present value: $2,088,478 $2,088,478 | |||||
Evidence and data. Interviewees explained how their security organizations were required to communicate risk information during internal team meetings and to company leadership on a routine basis. This included presenting up-to-date information on device compliance, asset vulnerabilities, incident response, and overall security risk posture. With Axonius, interviewees explained how their teams saved significant time in generating necessary reports for such presentations given the platform’s easy-to-access, built-in dashboards and report generation functionality. Automated report generation also supported governance and risk teams required to conduct evidence collection for compliance obligations and third-party audits.
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The size of this benefit may vary among organizations depending on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $84,000.
For , this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| D1 | SecOps resources | CompositeComposite | 55 | 55 | 55 | |
| D2 | Frequency of risk management meetings | InterviewsTEI case study | 1616 | 1616 | 1616 | |
| D3 | Hours dedicated to preparation per meeting in prior environment | InterviewsTEI case study | 88 | 88 | 88 | |
| D4 | Improvement with Axonius | InterviewsTEI case study | 75%75% | 75%75% | 75%75% | |
| D5 | Fully burdened hourly rate for a SecOps professional | AssumptionTEI standard | $72 $72 | $72 $72 | $72 $72 | |
| D6 | Subtotal: Security team efficiencies | D1*D2*D3*D4*D5 | $34,560 $34,560 | $34,560 $34,560 | $34,560 $34,560 | |
| D7 | Governance and risk team members | CompositeScaled to D1 | 55 | 55 | 55 | |
| D8 | Hours spent on evidence collection for compliance obligations and third-party audits in prior environment | InterviewsInterviews | 8080 | 8080 | 8080 | |
| D9 | Improvement with Axonius | InterviewsTEI case study | 80%80% | 80%80% | 80%80% | |
| D10 | Fully burdened hourly rate for a governance and risk team member | CompositeTEI standard | $48 $48 | $48 $48 | $48 $48 | |
| D11 | Subtotal: Governance and risk team efficiencies | D7*D8*D9*D10 | $15,360 $15,360 | $15,360 $15,360 | $15,360 $15,360 | |
| D12 | Productivity recapture | TEI Methodology | 75%75% | 75%75% | 75%75% | |
| Dt | Automated risk management and compliance reporting | (D6+D11)*D12 | $37,440 $37,440 | $37,440 $37,440 | $37,440 $37,440 | |
| Risk adjustment | ↓10% | |||||
| Dtr | Automated risk management and compliance reporting (risk-adjusted) | $33,696 $33,696 | $33,696 $33,696 | $33,696 $33,696 | ||
| Three-year total: $101,088 $101,088 | Three-year present value: $83,797 $83,797 | |||||
Evidence and data. Aside from vulnerability management and investigation response, interviewees described many use cases where other teams within their organizations used Axonius. These users saved time in their day-to-day workflows by accessing Axonius to query assets and configure automatic reports based on correlated asset data. Examples of these workflows included merger and acquisition asset discovery activity, driving consistencies with data in other systems, and enriching particular datasets in their organizations’ CMBDs. Many of these activities were performed on a regular basis.
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The size of this benefit may vary among organizations depending on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $671,000.
For , this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| E1 | Axonius users | CompositeComposite | 5050 | 5050 | 5050 | |
| E2 | Average percentage of workload that involves IT asset investigation or discovery | CompositeTEI case study | 10%10% | 10%10% | 10%10% | |
| E3 | Improvement with Axonius | InterviewsTEI case study | 80%80% | 80%80% | 80%80% | |
| E4 | Fully burdened annual salary for a user | CompositeTEI standard | $100,000 $100,000 | $100,000 $100,000 | $100,000 $100,000 | |
| E5 | Productivity recapture | TEI Methodology | 75%75% | 75%75% | 75%75% | |
| Et | Improved asset investigation workflows | E1*E2*E3*E4*E5 | $300,000 $300,000 | $300,000 $300,000 | $300,000 $300,000 | |
| Risk adjustment | ↓10% | |||||
| Etr | Improved asset investigation workflows (risk-adjusted) | $270,000 $270,000 | $270,000 $270,000 | $270,000 $270,000 | ||
| Three-year total: $810,000 $810,000 | Three-year present value: $671,450 $671,450 | |||||
Evidence and data. According to Forrester research, “Fixing the right weaknesses will result in fewer breaches, increasing customer trust while decreasing incident response and cyber insurance costs.”6 Interviewees explained that aside from the operational efficiencies described above, improved device posture and improved vulnerability management practices led to a reduction in risk of external breach for their organizations.
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The size of this benefit may vary among organizations depending on the extent to which a security breach impacts the organization and its associated cost.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $63,000.
For , this benefit may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| F1 | Likelihood of experiencing one or more breaches per year | Forrester ResearchForrester Research | 69%69% | 69%69% | 69%69% | |
| F2 | Mean cumulative cost of breaches | Forrester ResearchForrester Research | $3,798,000$3,798,000 | $3,798,000$3,798,000 | $3,798,000$3,798,000 | |
| F3 | Percentage of breaches originating from external attacks | Forrester Research | 57.7%57.7% | 57.7%57.7% | 57.7%57.7% | |
| F4 | Percentage of external attacks addressable with Axonius | Forrester Research | 42%42% | 42%42% | 42%42% | |
| F5 | Subtotal: Annual risk exposure addressable with Axonius | F1*F2*F3*F4 | $635,081$635,081 | $635,081$635,081 | $635,081$635,081 | |
| F6 | Reduced risk of breaches from external attacks with Axonius | InterviewsTEI case study | 5%5% | 5%5% | 5%5% | |
| Ft | Reduced risk of security breach | F5*F6 | $31,754$31,754 | $31,754$31,754 | $31,754$31,754 | |
| Risk adjustment | ↓20% | |||||
| Ftr | Reduced risk of security breach (risk-adjusted) | $25,403$25,403 | $25,403$25,403 | $25,403$25,403 | ||
| Three-year total: $76,210$76,210 | Three-year present value: $63,174$63,174 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement Axonius and later realize additional uses and business opportunities, including:
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Gtr | Axonius fees | $0 $0 | $775,000 $775,000 | $775,000 $775,000 | $775,000 $775,000 | $2,325,000 $2,325,000 | $1,927,310 $1,927,310 |
| Htr | Implementation and ongoing management | $60,480 $60,480 | $31,450 $31,450 | $31,450 $31,450 | $31,450 $31,450 | $154,829 $154,829 | $138,691 $138,691 |
| Total costs (risk-adjusted) | $60,480 $60,480 | $806,450 $806,450 | $806,450 $806,450 | $806,450 $806,450 | $2,479,829 $2,479,829 | $2,066,001 $2,066,001 | |
Evidence and data. Interviewees paid license fees based on the number of devices monitored in the Axonius Platform. The Axonius Platform fee includes:
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. This cost may vary among organizations depending on:
Results. This cost yields a three-year total PV (discounted at 10%) of $1.9 million.
For , Axonius fees may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| G1 | Axonius fees | AxoniusAxonius | $775,000 $775,000 | $775,000 $775,000 | $775,000 $775,000 | |
| Gt | Axonius fees | G1 | $0 $0 | $775,000 $775,000 | $775,000 $775,000 | $775,000 $775,000 |
| Three-year total: $2,325,000 $2,325,000 | Three-year present value: $1,927,310 $1,927,310 | |||||
Evidence and data. Interviewees explained that initial implementation was a straightforward process for their organizations. Axonius support collaborated with their teams to connect their existing security tools to Axonius via adapters. On an ongoing basis, interviewees explained that their teams dedicated time to configuring new dashboards, introducing new users on the platform, and configuring additional adapters and new enforcements.
Modeling and assumptions. For the financial analysis as applied to the composite organization, Forrester assumes:
Risks. The cost of this benefit may vary among organizations depending on:
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $139,000.
For , Axonius fees may have a three-year, risk-adjusted total PV of .
The following table shows custom results for .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
|---|---|---|---|---|---|---|
| H1 | SecOps resources | CompositeComposite | 44 | 44 | 44 | 44 |
| H2 | Hours dedicated to implementation per SecOps resource | InterviewsInterviews | 200200 | |||
| H3 | Hours dedicated to ongoing management and configuration per SecOps resource | InterviewsTEI case study | 104104 | 104104 | 104104 | |
| H4 | Fully burdened hourly rate for a SecOps professional | CompositeTEI standard | $72 $72 | $72 $72 | $72 $72 | $72 $72 |
| Ht | Implementation and ongoing management | (H1*H2*H4)+(H1*H3*H4) | $57,600 $57,600 | $29,952 $29,952 | $29,952 $29,952 | $29,952 $29,952 |
| Risk adjustment | ↑5% | |||||
| Htr | Implementation and ongoing management (risk-adjusted) | $60,480 $60,480 | $31,450 $31,450 | $31,450 $31,450 | $31,450 $31,450 | |
| Three-year total: $154,829 $154,829 | Three-year present value: $138,691 $138,691 | |||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($60,480)($60,480) | ($806,450)($806,450) | ($806,450)($806,450) | ($806,450)($806,450) | ($2,479,829)($2,479,829) | ($2,066,001)($2,066,001) |
| Total benefits | $0 $0 | $2,172,085$2,172,085 | $2,077,585$2,077,585 | $2,122,135$2,122,135 | $6,371,804$6,371,804 | $5,286,025$5,286,025 |
| Net benefits | ($60,480)($60,480) | $1,365,635$1,365,635 | $1,271,135$1,271,135 | $1,315,685$1,315,685 | $3,891,975$3,891,975 | $3,220,024$3,220,024 |
| ROI | 156%156% | |||||
| Payback | <6<6 | |||||
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.
Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
Related Forrester Research
Predictions 2025: Cybersecurity, Risk, And Privacy, Forrester Research, Inc., Oct 1, 2024.
Plan Your Critical Vulnerability Response, Forrester Research, Inc., October 17, 2024.
1 Source: The Three Principles Of Proactive Security, Forrester Research, Inc., May 1, 2024.
2 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
3 Source: The Attack Surface Management Solutions Landscape, Forrester Research, Inc., May 16, 2024.
4 Source: The Attack Surface Management Solutions Landscape, Forrester Research, Inc., May 16, 2024.
5 Source: The Four Steps For More Proactive Security, Forrester Research, Inc., May 1, 2024.
6 Ibid.
7 Source: Forrester’s Security Survey, 2024. Base: 641 Security decision-makers with network, data center, app security, or security operations responsibilities at companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific datasets most accurately applied to the situations that have been collected in the study.
8 Source: Forrester’s Security Survey, 2024. Base: 606 Security decision-makers with network, data center, app security, or security ops responsibilities at companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific datasets most accurately applied to the situations that have been collected in the study.
9 Source: Forrester’s Security Survey, 2024. Base: 1,542 Security decision-makers who have experienced a breach in the past 12 months. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific datasets most accurately applied to the situations that have been collected in the study.
10 Source: Build The Business Case For Cyber Risk Quantification, Forrester Research, Inc., May 31, 2024.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.
https://mainstayadvisor.com/go/mainstay/gdpr/policy.html