The Total Economic Impact™ Of Cisco Security Suites For Zero Trust

Cost Savings And Business Benefits Enabled By Security Suites For Zero Trust

A Forrester Total Economic Impact™ Study Commissioned By Cisco, March 2025

Today, 74% of global security decision-makers say their organizations are adopting Zero Trust.1 Coined by Forrester Research in 2009, Zero Trust is a security strategy of explicit policy enforcing least-privilege access and inspecting and monitoring everything.2 Investments in Zero Trust help organizations reduce the impacts of a material breach, transform technology architecture, and boost customer and employee experience for growth.3

Cisco Security solutions integrate to enable a Zero Trust architecture across users, devices, networks, cloud, endpoints, and email, including:

  • The User Protection Suite, which facilitates secure users’ access to applications, cloud services, and communication tools.
  • The Breach Protection Suite, which empowers security teams to simplify operations and accelerate response across the most prominent attack vectors, including email, endpoints, network, and cloud.

Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco Security Suites as part of their Zero Trust strategy.4 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco Security Suites on their organizations.

icon

Return on investment (ROI)

110%110%

icon

Net present value (NPV)

$2.34M$2.34M

To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed six representatives with experience using Cisco Security Suites For Zero Trust. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization with 5,000 FTEs globally and revenue of $2 billion per year.

Interviewees said that prior to using Cisco Security Suites for Zero Trust, their organizations’ environments had decentralized user management procedures. Siloed application access security and management efforts were completed by business resources as well as technology resources. The goal of securing user privileges often served as an entry point into their organizations’ journey toward Zero Trust architecture.

After investing in Cisco Security and rebuilding their technology environment using the pillars of Zero Trust, the interviewees reported significant cost savings and technology optimizations, including centralizing and automating functions for identity security and management. Key results from the investment include more secure and efficient user access to corporate resources, reduced volume of security incidents, and optimized support and remediation efforts.

Definition Of Zero Trust And Its Core Principles

Figure Image

Forrester’s Zero Trust definition combines the original three principles of Zero Trust with the operational domains of ZTX

Zero Trust is an information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads utilizing policy informed by continuous, contextual, risk-based verification across users and their associated devices. Zero Trust advocates three core principles: All entities are untrusted by default; least privilege access is enforced; and comprehensive security monitoring is implemented.

Source: Forrester Research, Inc. Unauthorized reproduction, citation, or distribution prohibited.

Key Findings

Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:

  • A 15% reduction in legacy costs by transitioning to Zero Trust architecture with Cisco Security, with a reduction of more than 3,000 hours of internal vendor management. The composite transforms its networking and security stack around the principles of Zero Trust using the Cisco Security User Protection Suite Advantage and Breach Protection Suite Premier. Several drivers act to consolidate networking and security spend, including licensing optimization, software or software-as-a-service (SaaS) license and subscription savings, and hardware decommissioning cost savings. The streamlined technology environment mitigates agent sprawl and requires fewer labor hours to administer. For the composite, incorporating Zero Trust principles into its consolidated networking and security infrastructure with the User and Breach Protection suites saves $527,000.

For , incorporating Zero Trust principles with the User and Breach Protection suites might save .

  • A 70% reduction in labor hours for identity security and access management with Cisco Security. The composite eliminates the unnecessary replication of identity security and management efforts with business resources. Instead, it automates key workflows with the Cisco Security Suites, leveraging only technical resources. Consolidating identity security and management with Cisco Security Suites allows business resources to reallocate more than 21,000 hours to higher-value activities, resulting in $934,000 of avoided and redundant identity security and management labor costs.

For , consolidating identity and security management with Cisco Security Suites might result in of avoided identity and security management labor costs.

  • An 80% productivity improvement for networking and infrastructure operations. With its transition to a Zero Trust architecture with Cisco Security Suites, the composite centralizes and automates previously manual network and infrastructure management workflows. Enabling Zero Trust principles in its effort to consolidate networking and security infrastructure with Cisco Security saves the composite organization $427,000.

For , enabling Zero Trust principles in an effort to consolidate networking and security infrastructure with Cisco Security might save .

  • A 50% reduction in resources needed to optimize for effective Zero Trust security management. To meet the full needs of a Zero Trust environment with Cisco Security Suites, the composite automates key security workflows; adds layers of protection for users, devices, and apps; and improves visibility and adds bidirectional integrations with Cisco Security Suites and other vendor tools. These enhanced capabilities and time savings with Cisco Security Suites lead to security operations optimizations saving the organization $667,000.

For , the enhanced capabilities and time savings with Cisco Security Suites might save .

  • A 60% reduction in the likelihood of a severe data breach, reducing the costs of a material breach. The composite organization has a 91% likelihood of experiencing one or more serious data breaches per year in which the organization’s sensitive data is potentially compromised, at an average potential cost of $4.1 million. With Cisco Security Suites deployed in alignment with Zero Trust principles, the composite reduces the likelihood of a severe data breach caused by an external attack by 60%. For the composite, enabling Zero Trust principles with Cisco Security helps the organization avoid $1,530,000 in costs associated with a material breach.

For , enabling Zero Trust principles with Cisco Security Suites might help avoid in costs associated with a material breach.

  • More than 12,000 end-user hours recaptured from improved remote access workflows. In the prior environment, the composite organization’s 2,500 remote end users wasted four minutes per day due to friction in accessing services remotely. With Cisco Security Suites in alignment with Zero Trust best practices, the composite reduces the time it takes end users to access services remotely by 75%, with 25% of that recaptured time reallocated toward productive use. For the composite, enabling Zero Trust principles with Cisco Security regains $353,000 worth of productive hours for end users.

For , enabling Zero Trust principles with Cisco Security Suites might regain worth of productive hours for end users.

  • More than 11,250 IT tickets avoided with help desk optimization. In the prior environment, the composite processed 7,500 IT support tickets, each of which took 10 minutes on average to resolve. With Cisco Security Suites and Zero Trust, the composite reduces related IT support ticket volume by 50%. For the composite, enabling Zero Trust principles with Cisco Security Suites saves the organization $27,000 in IT administration and help desk costs.

For , enabling Zero Trust principles with Cisco Security Suites might save in IT administration and help desk costs.

Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:

  • More efficient mergers and acquisitions (M&A) activities.
  • Reduced technical debt.
  • Improved standing with cybersecurity insurance providers.

Costs. Three-year, risk-adjusted PV costs for the composite organization include:

  • Cisco Security Enterprise Agreement. The composite organization deploys the Cisco Security Breach Protection Suite Premier and User Protection Suite Advantage in a phased implementation alongside the introduction of Zero Trust best practices. By the end of the three-year period, the composite organization completes 70% of its multiyear transition to Zero Trust architecture enabled by Cisco Security. Total Cisco Enterprise Agreement costs in this timeframe come to $1,706,000.

For , total Cisco Enterprise Agreement costs might come to .

  • Implementation and training. Over the multiyear transition, the composite dedicates internal technology resources to standing up and training in the new Cisco Security architecture to align with Zero Trust principles. It also relies on technical implementation support from Cisco’s Software Support Service, included in the Security Suite. Three-year implementation and training costs for change management efforts related to Cisco Security and Zero Trust total $287,000.

For , three-year implementation and training costs for change management efforts related to Cisco Security and Zero Trust might total .

  • Platform administration. The composite organization partially dedicates technology resources to maintaining the Cisco Security architecture. These resources are further supported by Cisco’s Software Support Service. For the composite, platform administration costs are $130,000.

For , platform administration costs might be .

The representative interviews and financial analysis found that a composite organization experiences benefits of $4.47M over three years versus costs of $2.12M, adding up to a net present value (NPV) of $2.34M and an ROI of 110%.

might experience benefits of over three years versus costs of , adding up to an NPV of and an ROI of 0%.

80%

Percentage reduction in siloed network and infrastructure management labor with Cisco Security automations

“The big value [of Cisco Security Suites] is the huge time savings and actually having products that work together in an ecosystem where we understand them. They all have the same look and feel, even though they do different things with the ability to natively integrate them all. The biggest return is the time it saves us from dealing with a lot of different point products to get the answers that we need.”

VP of IT services, construction

Key Statistics

  • icon icon

    Return on investment (ROI)

    110%110%
  • icon icon

    Benefits PV

    $4.47M$4.47M
  • icon icon

    Net present
    value (NPV)

    $2.34M$2.34M
  • icon icon

    Payback

    <6 months<6 months
  • icon icon
  • icon icon
  • icon icon
  • icon icon

Benefits (Three-Year)

Legacy networking and security infrastructure consolidation Identity security and management consolidation Networking and infrastructure operations improvement Security operations optimization Avoided costs of a material breach Remote end user productivity savings IT administration and help desk cost savings

TEI Framework And Methodology

From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in Cisco Security Suites.

The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Cisco Security Suites can have on an organization.

  1. Due Diligence

    Interviewed Cisco stakeholders and Forrester analysts to gather data relative to Cisco Security Suites for Zero Trust.

  2. Interviews

    Interviewed six people at organizations using Cisco Security Suites to obtain data about costs, benefits, and risks.

  3. Composite Organization

    Designed a composite organization based on characteristics of the interviewees’ organizations.

  4. Financial Model Framework

    Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.

  5. Case Study

    Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the Total Economic Impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.

Disclosures

Readers should be aware of the following:

This study is commissioned by Cisco and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.

Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Cisco Security Suites. For the interactive functionality using Configure Data/Custom Data, the intent is for the questions to solicit inputs specific to a prospect’s business. Forrester believes that this analysis is representative of what companies may achieve with Cisco Security Suites based on the inputs provided and any assumptions made. Forrester does not endorse Cisco or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, Cisco and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided “as is,” and Forrester and Cisco make no warranties of any kind.

Cisco reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.

Cisco provided the customer names for the interviews but did not participate in the interviews.

Consulting Team:

Courtenay O’Connor

M
K

Cookie Preferences

Accept Cookies

A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.

Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.

Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.

Please see our Privacy Policy for more information.