A Forrester Total Economic Impact™ Study Commissioned By Cisco, March 2025
Today, 74% of global security decision-makers say their organizations are adopting Zero Trust.1 Coined by Forrester Research in 2009, Zero Trust is a security strategy of explicit policy enforcing least-privilege access and inspecting and monitoring everything.2 Investments in Zero Trust help organizations reduce the impacts of a material breach, transform technology architecture, and boost customer and employee experience for growth.3
Cisco Security solutions integrate to enable a Zero Trust architecture across users, devices, networks, cloud, endpoints, and email, including:
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco Security Suites as part of their Zero Trust strategy.4 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco Security Suites on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed six representatives with experience using Cisco Security Suites For Zero Trust. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization with 5,000 FTEs globally and revenue of $2 billion per year.
Interviewees said that prior to using Cisco Security Suites for Zero Trust, their organizations’ environments had decentralized user management procedures. Siloed application access security and management efforts were completed by business resources as well as technology resources. The goal of securing user privileges often served as an entry point into their organizations’ journey toward Zero Trust architecture.
After investing in Cisco Security and rebuilding their technology environment using the pillars of Zero Trust, the interviewees reported significant cost savings and technology optimizations, including centralizing and automating functions for identity security and management. Key results from the investment include more secure and efficient user access to corporate resources, reduced volume of security incidents, and optimized support and remediation efforts.
Forrester’s Zero Trust definition combines the original three principles of Zero Trust with the operational domains of ZTX
Zero Trust is an information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads utilizing policy informed by continuous, contextual, risk-based verification across users and their associated devices. Zero Trust advocates three core principles: All entities are untrusted by default; least privilege access is enforced; and comprehensive security monitoring is implemented.
Source: Forrester Research, Inc. Unauthorized reproduction, citation, or distribution prohibited.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
For , incorporating Zero Trust principles with the User and Breach Protection suites might save .
For , consolidating identity and security management with Cisco Security Suites might result in of avoided identity and security management labor costs.
For , enabling Zero Trust principles in an effort to consolidate networking and security infrastructure with Cisco Security might save .
For , the enhanced capabilities and time savings with Cisco Security Suites might save .
For , enabling Zero Trust principles with Cisco Security Suites might help avoid in costs associated with a material breach.
For , enabling Zero Trust principles with Cisco Security Suites might regain worth of productive hours for end users.
For , enabling Zero Trust principles with Cisco Security Suites might save in IT administration and help desk costs.
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
For , total Cisco Enterprise Agreement costs might come to .
For , three-year implementation and training costs for change management efforts related to Cisco Security and Zero Trust might total .
For , platform administration costs might be .
The representative interviews and financial analysis found that a composite organization experiences benefits of $4.47M over three years versus costs of $2.12M, adding up to a net present value (NPV) of $2.34M and an ROI of 110%.
might experience benefits of over three years versus costs of , adding up to an NPV of and an ROI of 0%.
Return on investment (ROI)
Benefits PV
Net present
value (NPV)
Payback
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in Cisco Security Suites.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Cisco Security Suites can have on an organization.
Interviewed Cisco stakeholders and Forrester analysts to gather data relative to Cisco Security Suites for Zero Trust.
Interviewed six people at organizations using Cisco Security Suites to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the Total Economic Impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by Cisco and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Cisco Security Suites. For the interactive functionality using Configure Data/Custom Data, the intent is for the questions to solicit inputs specific to a prospect’s business. Forrester believes that this analysis is representative of what companies may achieve with Cisco Security Suites based on the inputs provided and any assumptions made. Forrester does not endorse Cisco or its offerings. Although great care has been taken to ensure the accuracy and completeness of this model, Cisco and Forrester Research are unable to accept any legal responsibility for any actions taken on the basis of the information contained herein. The interactive tool is provided “as is,” and Forrester and Cisco make no warranties of any kind.
Cisco reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
Cisco provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Courtenay O’Connor
| Role | Industry | Region | Total Users |
|---|---|---|---|
| Senior IT infrastructure architect | IT services | Europe | 500 to 999 |
| Network enterprise architect | Oil and gas | Asia Pacific | 5,000 to 9,999 |
| Cybersecurity manager | B2C commerce | North America | 5,000 to 9,999 |
| Vice president, IT services | Construction | North America | 5,000 to 9,999 |
| Vice president, information technology | Real estate | North America | Fewer than 500 |
| CIO | Legal services | North America | Fewer than 500 |
The interviewees noted how their organizations struggled with common challenges, including:
The interviewees’ organizations searched for a solution that could address their growing concerns regarding shadow IT, which became more prevalent as the organizations shifted applications to the cloud. Interviewees noted that a primary entry point on their Zero Trust journeys was their organizational goals to secure user access to critical corporate resources. Other goals for this digital transformation included to:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the six interviewees, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The composite is a globally distributed organization generating $2 billion in annual revenue. It is supported by 5,000 FTEs worldwide, with 30 FTEs dedicated to technology infrastructure, networking, and security operations as well as troubleshooting and incident response. Early in its security maturity journey, the composite organization’s legacy approach to cyber defense followed a traditional one in which its network represented its main perimeter.
The composite has 50 enterprise applications as a result of growing sprawl in its technology estate. In the past, applications were often unsupported by the technology organization, with identity management functions decentralized among business units, resulting in redundant identity management and security operations and troubleshooting.
Deployment characteristics. The composite organization is undergoing a digital transformation to align cyber defense strategies with business growth objectives. It seeks to limit the sprawl of its technology estate while centralizing and streamlining activities for identity security and management. As part of this technology consolidation, the composite organization is also shifting to a hybrid work model in which half of the FTEs will work remotely part time.
To stay competitive and secure its brand, the composite organization sets out on a multiyear journey toward Zero Trust intermediate maturity. To facilitate this transformation, the composite organization transitions its users to a Cisco Security environment featuring
The composite organization’s change management effort includes a multiyear transition to mainstream Zero Trust principles in the Cisco Security environment. It deploys Cisco Security’s User Protection Suite and Breach Protection Suite to 25% of all users in Year 1. This increases to 55% of all users in year 2, with 70% of users supported by the Cisco Security environment by the end of Year 3.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Legacy networking and security infrastructure consolidation | $109,148$109,148 | $240,126$240,126 | $305,615$305,615 | $654,889 $654,889 | $527,289 $527,289 |
| Btr | Identity security and management consolidation | $193,284$193,284 | $425,225$425,225 | $541,195$541,195 | $1,159,704 $1,159,704 | $933,746 $933,746 |
| Ctr | Networking and infrastructure operations improvement | $88,358$88,358 | $194,388$194,388 | $247,404$247,404 | $530,150 $530,150 | $426,855 $426,855 |
| Dtr | Security operations optimization | $138,060$138,060 | $303,732$303,732 | $386,568$386,568 | $828,360 $828,360 | $666,962 $666,962 |
| Etr | Avoided costs of a material breach | $316,691$316,691 | $696,720$696,720 | $886,734$886,734 | $1,900,145 $1,900,145 | $1,529,919 $1,529,919 |
| Ftr | Remote end-user productivity savings | $73,124$73,124 | $160,874$160,874 | $204,748$204,748 | $438,746 $438,746 | $353,261 $353,261 |
| Gtr | IT administration and help desk cost savings | $5,616$5,616 | $12,384$12,384 | $15,768$15,768 | $33,768 $33,768 | $27,187 $27,187 |
| Total benefits (risk-adjusted) | $924,281 $924,281 | $2,033,449 $2,033,449 | $2,588,032 $2,588,032 | $5,545,763 $5,545,763 | $4,465,219 $4,465,219 | |
Evidence and data. In general, customers reported a consolidated spend related to several factors, including Cisco licensing optimization, software or SaaS license and subscription savings, and legacy hardware decommissioning cost savings. The optimized and consolidated technology environment required fewer resource hours to manage additional solutions from multiple vendors, providing additional technology management labor optimization.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that the total licensing costs for networking and security tools in the prior environment at might be $0.
Based on the information provided, Forrester estimates that the internal labor to maintain the legacy infrastructure and security stack at might be 0 hours.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $527,000.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Total cost of legacy systems consolidated or decommissioned with Zero Trust and Cisco Security | CompositeScaled for | $2,432,250 $2,432,250 | $2,432,250 $2,432,250 | $2,432,250 $2,432,250 | |
| A2 | Percentage reduction in legacy costs with transition to Zero Trust architecture with Cisco Security | InterviewsTEI case study | 15%15% | 15%15% | 15%15% | |
| A3 | Percentage of transition to Zero Trust architecture with Cisco Security | InterviewsTEI case study | 25%25% | 55%55% | 70%70% | |
| A4 | Subtotal: legacy infrastructure cost consolidation with Cisco Security | A1*A2*A3 | $91,209 $91,209 | $200,661 $200,661 | $255,386 $255,386 | |
| A5 | Hours of internal labor to maintain legacy infrastructure in prior environment | InterviewsScaled for | 2,9122,912 | 2,9122,912 | 2,9122,912 | |
| A6 | Percentage reduction in hours of internal labor to maintain legacy infrastructure | InterviewsTEI case study | 70%70% | 70%70% | 70%70% | |
| A7 | Blended fully burdened hourly rate of a technology resource | CompositeTEI standard | $59 $59 | $59 $59 | $59 $59 | |
| A8 | Subtotal: avoided internal labor costs to maintain legacy infrastructure | A3*A5*A6*A7 | $30,066 $30,066 | $66,146 $66,146 | $84,186 $84,186 | |
| At | Legacy networking and security infrastructure consolidation | A4+A8 | $121,275 $121,275 | $266,807 $266,807 | $339,572 $339,572 | |
| Risk adjustment | ↓10% | |||||
| Atr | Legacy networking and security infrastructure consolidation (risk-adjusted) | $109,148 $109,148 | $240,126 $240,126 | $305,615 $305,615 | ||
| Three-year total: $654,889 $654,889 | Three-year present value: $527,289 $527,289 | |||||
Evidence and data. In the interviewees’ prior environment, identity management responsibility was atomized across the organizations, leading to labor inefficiencies and increasing the risk of misconfigurations, security gaps, and the potential for threat actors to gain access, resulting in lateral movement inside of the network. Day-to-day identity management effort was taken on by business resources, while incident management and troubleshooting also required help desk and technology resources.
With their transition to Zero Trust architecture with Cisco Security Suites, interviewees discussed how their organizations were able to consolidate identity security and management within the Cisco Security platform. This eliminated business resources’ role both in the redundant, manual management efforts and in identity security remediation efforts such as account takeovers and investigations, thus allowing these resources to focus on higher-value activities. The transition to the Cisco Security environment also conferred efficiencies in identity security and management benefits for technical resources, which are reflected in the Security Operations Optimization benefit as well as the IT Administration And Help Desk Cost Savings benefit.
Interviewees noted several specific value drivers for their organizations, which varied in how they managed identities prior to Cisco Security Suites:
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
maintains an average of 0 enterprise applications at any given time.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $934,000.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Total applications | CompositeComposite | 5050 | 5050 | 5050 | |
| B2 | Hours of decentralized identity security and management labor per application in the prior environment | InterviewsTEI case study | 416416 | 416416 | 416416 | |
| B3 | Total hours of identity and access management labor in the prior environment | B1*B2 | 20,80020,800 | 20,80020,800 | 20,80020,800 | |
| B4 | Percentage reduction in hours of identity and access management labor with Cisco Security | InterviewsTEI case study | 70%70% | 70%70% | 70%70% | |
| B5 | Percentage of transition to Zero Trust architecture with Cisco Security | A3 | 25%25% | 55%55% | 70%70% | |
| B6 | Blended fully burdened hourly rate of a technology resource | CompositeTEI standard | $59 $59 | $59 $59 | $59 $59 | |
| Bt | Identity security and management consolidation | B3*B4*B5*B6 | $214,760 $214,760 | $472,472 $472,472 | $601,328 $601,328 | |
| Risk adjustment | ↓10% | |||||
| Btr | Identity security and management consolidation (risk-adjusted) | $193,284 $193,284 | $425,225 $425,225 | $541,195 $541,195 | ||
| Three-year total: $1,159,704 $1,159,704 | Three-year present value: $933,746 $933,746 | |||||
Evidence and data. As they centralized networking and security functions with Cisco Security Suites, interviewees shared how their organizations leveraged infrastructure automation and orchestration of the provisioning lifecycle for virtual and physical devices for operational efficiencies. By automating major tenets of Zero Trust into the provisioning lifecycle, interviewees shared how their teams were able to increase their deployment capacity and reduce service-level agreement (SLA) timeframes and related labor effort. At the same time, they discussed how their teams reduced manual errors and related labor to correct errors, and how they mitigated the risk of misconfiguration that could lead to cost overruns and risky security gaps.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that might dedicate 0 resources to siloed network and infrastructure management.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $427,000.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Resources dedicated to siloed network and infrastructure management in the prior environment | CompositeScaled for | 44 | 44 | 44 | |
| C2 | Percentage reduction in siloed network and infrastructure management labor with Cisco Security automations | InterviewsTEI case study | 80%80% | 80%80% | 80%80% | |
| C3 | Percentage of transition to Zero Trust architecture with Cisco Security | A3 | 25%25% | 55%55% | 70%70% | |
| C4 | Blended fully burdened annual salary of a technology resource | CompositeTEI standard | $122,720 $122,720 | $122,720 $122,720 | $122,720 $122,720 | |
| Ct | Networking and infrastructure operations improvement | C1*C2*C3*C4 | $98,176 $98,176 | $215,987 $215,987 | $274,893 $274,893 | |
| Risk adjustment | ↓10% | |||||
| Ctr | Networking and infrastructure operations improvement (risk-adjusted) | $88,358 $88,358 | $194,388 $194,388 | $247,404 $247,404 | ||
| Three-year total: $530,150 $530,150 | Three-year present value: $426,855 $426,855 | |||||
Evidence and data. Interviewees discussed how the activation of Zero Trust principles served to guide the transition toward Cisco Security solutions, and how the integration of these new technologies and processes assisted their security teams in their day-to-day, proactive cyber defense efforts.
This benefit examines the business value of avoided manual cyber defense workflows intended to prevent threats from materializing into a serious material breach, or to prevent unauthorized disclosure of critical data. See Avoided Costs Of A Material Breach, Benefit E, for analysis on the business value that may occur once a threat is realized.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that might dedicate 0 technology resources to security operations related to Zero Trust.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $667,000.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| D1 | Total resources required to optimize for effective Zero Trust security management | CompositeScaled for | 1010 | 1010 | 1010 | |
| D2 | Percentage reduction in new resources needed to optimize for effective Zero Trust security management attributed to Cisco Security | InterviewsTEI case study | 50%50% | 50%50% | 50%50% | |
| D3 | Percentage of transition to Zero Trust architecture with Cisco Security | A3 | 25%25% | 55%55% | 70%70% | |
| D4 | Blended fully burdened annual salary of a technology resource | CompositeTEI standard | $122,720 $122,720 | $122,720 $122,720 | $122,720 $122,720 | |
| Dt | Security operations optimization | D1*D2*D3*D4 | $153,400 $153,400 | $337,480 $337,480 | $429,520 $429,520 | |
| Risk adjustment | ↓10% | |||||
| Dtr | Security operations optimization (risk-adjusted) | $138,060 $138,060 | $303,732 $303,732 | $386,568 $386,568 | ||
| Three-year total: $828,360 $828,360 | Three-year present value: $666,962 $666,962 | |||||
Evidence and data. As a result of the optimized security environment and improved security management workflows described above, interviewees further articulated business benefits related to reduced costs of a potential material breach. Interviewees noted how their Cisco Security Suites, sometimes in combination with other vendor tools and aligning with Zero Trust principles, effectively blocked and remediated attacks, reallocating that amount of reactive team effort to higher-value security activities.
This benefit examines the business value of avoided costs that may occur once a threat is realized. See Security Operations Optimization, Benefit D, for analysis on the business value of avoided manual, proactive cyber defense workflows.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that might have a 0% likelihood of experiencing one or more serious data breach per year.
Based on the information provided, Forrester estimates that the mean cumulative cost of data breaches in the prior environment at might be $0.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.5 million.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| E1 | Likelihood of experiencing one or more breaches per year | Forrester Research | 91%91% | 91%91% | 91%91% | |
| E2 | Mean cumulative cost of breaches | InterviewsForrester Research | $4,143,000 $4,143,000 | $4,143,000 $4,143,000 | $4,143,000 $4,143,000 | |
| E3 | Percentage of breaches originating from external attacks and addressable with Zero Trust architecture and Cisco Security | Forrester Research | 70%70% | 70%70% | 70%70% | |
| E4 | Annual risk exposure addressable with Cisco Security | E1*E2*E3 | $2,639,091 $2,639,091 | $2,639,091 $2,639,091 | $2,639,091 $2,639,091 | |
| E5 | Reduced risk of breaches attributed to Cisco Security and from leveraging Zero Trust principles | InterviewsTEI case study | 60%60% | 60%60% | 60%60% | |
| E6 | Percentage of transition to Zero Trust architecture with Cisco Security | A3 | 25%25% | 55%55% | 70%70% | |
| Et | Avoided costs of a material breach | E5*E4*E6 | $395,864 $395,864 | $870,900 $870,900 | $1,108,418 $1,108,418 | |
| Risk adjustment | ↓20% | |||||
| Etr | Avoided costs of a material breach (risk-adjusted) | $316,691 $316,691 | $696,720 $696,720 | $886,734 $886,734 | ||
| Three-year total: $1,900,145 $1,900,145 | Three-year present value: $1,529,919 $1,529,919 | |||||
Evidence and data. Interviewees shared how the transition to Zero Trust approaches with Cisco Security Suites helped streamline the overall technology environment and reduce the amount of friction an end user faced when accessing the network remotely. By shifting to URL-based access linked to their organization’s identity provider, they can reduce keystrokes associated with the legacy authentication process.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
has 0 end users accessing services remotely.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $353,000.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| F1 | End users accessing services remotely | CompositeComposite | 2,5002,500 | 2,5002,500 | 2,5002,500 | |
| F2 | Total minutes per end user to access services remotely, per day | InterviewsTEI case study | 44 | 44 | 44 | |
| F3 | Total hours end users spend accessing services remotely per year in prior environment | F1*F2/60*260 | 43,33343,333 | 43,33343,333 | 43,33343,333 | |
| F4 | Reduction in time for end users to access services remotely with Cisco | InterviewsTEI case study | 75%75% | 75%75% | 75%75% | |
| F5 | End-user productivity capture | CompositeTEI standard | 25%25% | 25%25% | 25%25% | |
| F6 | Fully burdened hourly rate for an end user (average) | CompositeTEI case study | $40 $40 | $40 $40 | $40 $40 | |
| F7 | Percentage of transition to Zero Trust architecture with Cisco Security | A3 | 25%25% | 55%55% | 70%70% | |
| Ft | Remote end-user productivity savings | F3*F4*F5*F6*F7 | $81,249 $81,249 | $178,749 $178,749 | $227,498 $227,498 | |
| Risk adjustment | ↓10% | |||||
| Ftr | Remote end-user productivity savings (risk-adjusted) | $73,124 $73,124 | $160,874 $160,874 | $204,748 $204,748 | ||
| Three-year total: $438,746 $438,746 | Three-year present value: $353,261 $353,261 | |||||
Evidence and data. By shifting to a technology environment that upholds Zero Trust principles using Cisco Security Suites, interviewees reported that their organizations were able to reduce the volume of issues related to user access.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that might process an average of 0 IT support tickets related to user access and device and infrastructure troubleshooting.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $27,000.
For , this benefit might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| G1 | Total IT support tickets related to user accounts and access in the prior environment | CompositeScaled for | 7,5007,500 | 7,5007,500 | 7,5007,500 | |
| G2 | Average minutes to resolve IT support tickets related to user accounts and access in the prior environment | CompositeTEI case study | 1010 | 1010 | 1010 | |
| G3 | Total hours to resolve IT support tickets related to user accounts and access in the prior environment | G1*G2/60 | 1,2501,250 | 1,2501,250 | 1,2501,250 | |
| G4 | Percentage reduction in related IT support tickets with Cisco Security | InterviewsTEI case study | 50%50% | 50%50% | 50%50% | |
| G5 | Percentage of transition to Zero Trust architecture with Cisco Security | A3 | 25%25% | 55%55% | 70%70% | |
| G6 | Hours of avoided IT support due to reduced ticket volume with Cisco Security | G3*G4*G5 | 156156 | 344344 | 438438 | |
| G7 | Fully burdened hourly rate for an IT support technician | CompositeTEI standard | $40 $40 | $40 $40 | $40 $40 | |
| Gt | IT administration and help desk cost savings | G6*G7 | $6,240 $6,240 | $13,760 $13,760 | $17,520 $17,520 | |
| Risk adjustment | ↓10% | |||||
| Gtr | IT administration and help desk cost savings (risk-adjusted) | $5,616 $5,616 | $12,384 $12,384 | $15,768 $15,768 | ||
| Three-year total: $33,768 $33,768 | Three-year present value: $27,187 $27,187 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not quantified for this study:
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement Cisco Security Suites and later realize additional uses and business opportunities, including:
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Htr | Cisco Security Enterprise Agreement | $0$0 | $353,194$353,194 | $777,026$777,026 | $988,943$988,943 | $2,119,163 $2,119,163 | $1,706,263 $1,706,263 |
| Itr | Implementation and training | $179,630$179,630 | $78,959$78,959 | $35,409$35,409 | $8,142$8,142 | $302,140 $302,140 | $286,791 $286,791 |
| Jtr | Platform administration | $0$0 | $26,998$26,998 | $59,397$59,397 | $75,595$75,595 | $161,990 $161,990 | $130,428 $130,428 |
| Total costs (risk-adjusted) | $179,630 $179,630 | $459,151 $459,151 | $871,832 $871,832 | $1,072,680 $1,072,680 | $2,583,292 $2,583,292 | $2,123,482 $2,123,482 | |
Evidence and data. Interviewees discussed the components of their organization’s Enterprise Agreements for Cisco Security Suites. They noted several aspects of the agreement that allowed their organizations the flexibility to grow without limiting their security coverage in between agreement cycles.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that Cisco Enterprise Agreement costs for might be $0 in Year 1, $0 in Year 2, and $0 in Year 3. These estimates do not constitute a quote. Contact Cisco for more details.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.7 million.
For , this cost might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| H1 | Cisco Security Enterprise Agreement for Breach Premier and User Advantage | InterviewsScaled for | $0 $0 | $336,375 $336,375 | $740,025 $740,025 | $941,850 $941,850 | |
| Ht | Cisco Security Enterprise Agreement | H1 | $0 $0 | $336,375 $336,375 | $740,025 $740,025 | $941,850 $941,850 | |
| Risk adjustment | ↑5% | ||||||
| Htr | Cisco Security Enterprise Agreement (risk-adjusted) | $0 $0 | $353,194 $353,194 | $777,026 $777,026 | $988,943 $988,943 | ||
| Three-year total: $2,119,163 $2,119,163 | Three-year present value: $1,706,263 $1,706,263 | ||||||
Evidence and data. Most interviewees’ organizations already had some Cisco networking or security products incorporated into their technology environment before beginning their journey to facilitate a Zero Trust approach to their security architecture. Several interviewees highlighted the value of Cisco Security Suite’s technical support during the implementation and integration process.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that might dedicate 0 technology resources to standing up the new Cisco Security architecture to align with Zero Trust principles in the initial period.
Based on the information provided, Forrester estimates that might dedicate 0 technology resources to standing up additional portions of the new Cisco Security architecture in Year 1.
Based on the information provided, Forrester estimates that might dedicate 0 technology resources implementation efforts in Year 2.
Based on the information provided, Forrester estimates that at , there might be 0 trainees in the initial period, 0 trainees in Year 1, and 0 trainees in Year 2.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:
Results. To account for these risks, Forrester adjusted this cost upward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $287,000.
For , this cost might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| I1 | Total resources dedicated to the implementation effort | InterviewsScaled for | 1515 | 1010 | 55 | 00 | |
| I2 | Average hours of implementation effort per resource | InterviewsTEI case study | 104104 | 5252 | 2626 | 00 | |
| I3 | Blended fully burdened hourly rate for an implementation resource | CompositeTEI standard | $59 $59 | $59 $59 | $59 $59 | $59 $59 | |
| I4 | Subtotal: internal implementation costs | I1*I2*I3 | $92,040 $92,040 | $30,680 $30,680 | $7,670 $7,670 | $0 $0 | |
| I5 | Subtotal: external implementation costs | InterviewsScaled for | $50,000 $50,000 | $25,000 $25,000 | $12,500 $12,500 | $0 $0 | |
| I6 | New trainees | I1 | 1515 | 1010 | 55 | 00 | |
| I7 | Hours of new user training, per trainee | InterviewsTEI case study | 1616 | 1616 | 1616 | 1616 | |
| I8 | Ongoing trainees | I6PY+I6 | 00 | 1515 | 2525 | 3030 | |
| I9 | Annual ongoing training for existing users | InterviewsTEI case study | 44 | 44 | 44 | 44 | |
| I10 | Subtotal: training costs | I3*((I6*I7)+(I8*I9)) | $14,160 $14,160 | $12,980 $12,980 | $10,620 $10,620 | $7,080 $7,080 | |
| It | Implementation and training | I4+I5+I10 | $156,200 $156,200 | $68,660 $68,660 | $30,790 $30,790 | $7,080 $7,080 | |
| Risk adjustment | ↑15% | ||||||
| Itr | Implementation and training (risk-adjusted) | $179,630 $179,630 | $78,959 $78,959 | $35,409 $35,409 | $8,142 $8,142 | ||
| Three-year total: $302,140 $302,140 | Three-year present value: $286,791 $286,791 | ||||||
Evidence and data. As with implementation, interviewees underscored the value of Cisco Security Suites’ technical support and operational guidance, Cisco’s Software Support Service. They noted that this combination of internal and vendor-supplied efforts added to the efficiency of their Zero Trust architecture with Cisco products.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Based on the information provided, Forrester estimates that for , platform administration might require 0 hours of labor at full deployment.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $130,000.
For , this cost might have a three-year, risk-adjusted total PV of .
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| J1 | Total hours dedicated to maintaining Cisco Security environment | InterviewsScaled for | 00 | 1,6641,664 | 1,6641,664 | 1,6641,664 | |
| J2 | Percentage reduction in legacy costs with transition to Zero Trust architecture with Cisco Security | A3 | 0%0% | 25%25% | 55%55% | 70%70% | |
| J3 | Fully burdened hourly rate of an administrator | CompositeTEI standard | $59 $59 | $59 $59 | $59 $59 | $59 $59 | |
| Jt | Platform administration | J1*J2*J3 | $0 $0 | $24,544 $24,544 | $53,997 $53,997 | $68,723 $68,723 | |
| Risk adjustment | ↑10% | ||||||
| Jtr | Platform administration (risk-adjusted) | $0 $0 | $26,998 $26,998 | $59,397 $59,397 | $75,595 $75,595 | ||
| Three-year total: $161,990 $161,990 | Three-year present value: $130,428 $130,428 | ||||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($179,630)($179,630) | ($459,151)($459,151) | ($871,832)($871,832) | ($1,072,680)($1,072,680) | ($2,583,292)($2,583,292) | ($2,123,482)($2,123,482) |
| Total benefits | $0 $0 | $924,281 $924,281 | $2,033,449 $2,033,449 | $2,588,032 $2,588,032 | $5,545,763 $5,545,763 | $4,465,219 $4,465,219 |
| Net benefits | ($179,630)($179,630) | $465,130 $465,130 | $1,161,617 $1,161,617 | $1,515,352 $1,515,352 | $2,962,470 $2,962,470 | $2,341,737 $2,341,737 |
| ROI | 110%110% | |||||
| Payback period (months) | <6<6 | |||||
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Benefits represent the value delivered to the business by the product. The TEI methodology places equal weight on the measure of benefits and the measure of costs, allowing for a full examination of the effect of the technology on the entire organization.
Costs consider all expenses necessary to deliver the proposed value, or benefits, of the product. The cost category within TEI captures incremental costs over the existing environment for ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. Having the ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
1 Source: Zero Trust Everywhere Is The Security Model Of The Future, Forrester Research, Inc., September 5, 2024.
2 Source: The Definition Of Modern Zero Trust, Forrester Research, Inc., April 22, 2024.
3 Source: The Business Of Zero Trust Security, Forrester Research, Inc., July 11, 2023. A material breach is defined as a the compromise of an organization's sensitive data is or in the past 12 months per year. A data breach can be defined as the unlawful and unauthorized acquisition of personal information that compromises the security, confidentiality, or integrity of personal information. Source: The National Association of Attorneys General.
4 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
5 Source: Forrester's Security Survey, 2023. Base: 830 security decision-makers with network, data center, app security, or security ops responsibilities at companies with $10 million in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
6 Ibid.
7 Note: Data-center-to-data-center workloads are excluded from this analysis.
8 Source: Forrester's Security Survey, 2023. Base: 830 security decision-makers with network, data center, app security, or security ops responsibilities at companies with $10 million in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.
https://mainstayadvisor.com/go/mainstay/gdpr/policy.html