NOVEMBER 2023
Phishing and business email compromise are perennial problems for security leaders and professionals, with 36% of security decision-makers whose organization experienced an external attack naming phishing or social engineering as the source, according to Forrester’s Security Survey, 2022.1 Enterprise email security solutions to protect business communication and its ecosystem are evolving to enable trusted communication, block a major inroad for attackers, and protect end users from themselves.2
Egress Software Technologies provides an adaptive cloud email security platform that continuously assesses human risk and dynamically adapts policy controls, which prepares customers to defend their enterprises against advanced phishing attacks, outbound data loss, or exposure incidents. Egress integrates into Microsoft 365 to augment its native security capabilities and stop the inbound and outbound threats that secure email gateways (SEGs) miss while providing holistic email security reporting to surface organizational and human risk insights.
Egress Software Technologies Ltd. commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Egress Intelligent Email Security.3 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Egress on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four representatives with experience using Egress Intelligent Email Security. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a global financial services organization with 9,000 mailboxes.
Prior to using Egress, the interviewees’ organizations primarily depended on its endpoint protection solution and a combination of third-party software, such as secure email gateways, for threat protection and analysis. However, these solutions offered limited protection, which often led to phishing attacks business email compromises, near-miss security incidents and additional auditing from their ecosystem partners. These limitations led the interviewees’ organizations to pursue a solution that elevated the overall email security environment while retaining their existing Microsoft environment.
After the investment in Egress Intelligent Email Security, the interviewees’ organizations were able to enhance protection against sophisticated attacks, identify and avoid breaches, prevent data loss incidents, and better monitor and analyze the email threat landscape. Key results from the investment included cost-effort avoidance related to the investigation and remediation of breaches, misdirections, and data loss incidents; productivity savings for IT security resources and end users from reduced managing and monitoring emails; and resource time savings from reduced threat analysis, reporting and auditing activities.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
The representative interviews and financial analysis found that a composite organization experiences benefits of $5.86M over three years versus costs of $1.27M, adding up to a net present value (NPV) of $4.58M and an ROI of 359%.
Return on investment (ROI):
Benefits PV:
Net present value (NPV):
Payback:
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment Egress Intelligent Email Security.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Egress Intelligent Email Security can have on an organization.
Interviewed Egress stakeholders and Forrester analysts to gather data relative to Egress Intelligent Email Security.
Interviewed four representatives at organizations using Egress Intelligent Email Security to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by Egress and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Egress.
Egress reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
Egress provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Elina Bauwens
Bharath Sivan
| Role | Industry | Region | Employees | Revenue |
|---|---|---|---|---|
| VP of global IT security | Financial services | Global | 12,000 | $1.8B |
| Head of information security | Legal services | Global | 6,000 | $2.4B |
| Chief digital officer | Healthcare services | United Kingdom | 7,000 | $394M |
| Head of information security | Legal services | Global | 3,500 | $613M |
Prior to using Egress Intelligent Email Security, the interviewees’ organizations primarily depended on Microsoft Defender Endpoint security and a combination of third-party software for threat protection, data-loss protection, and analysis for their business communications.
The interviewees noted how their organizations struggled with common challenges, including:
The interviewees’ organizations searched for a solution that could:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the four interviewees, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. It is a global financial services organization with 9,000 individual and group mailboxes and 200 staff members working in IT. It also has an annual email volume of approximately 30 million inbound emails and 13 million outbound emails. The user’s email contents often include sensitive client information, personally identifiable information (PII) and critical business data, and can be time sensitive. The composite organization deploys Egress Inbound Email Security, Defend, in Year 1, and continues with the deployment of Egress Outbound Email Security, Prevent, in Year 2.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Inbound email protection savings | $1,108,202 | $1,162,724 | $1,210,046 | $3,480,973 | $2,877,512 |
| Btr | Outbound email protection savings | $0 | $1,698,889 | $1,698,889 | $3,397,778 | $2,680,441 |
| Ctr | Reporting, analysis and audit savings | $120,668 | $120,668 | $120,668 | $362,003 | $300,083 |
| Total benefits (risk-adjusted) | $1,228,870 | $2,982,281 | $3,029,603 | $7,240,754 | $5,858,036 |
Evidence and data. Egress’s inbound email security solution uses self-adapting, machine-learning-based technology to detect and flag malicious emails. The VP of global IT security at a financial services organization explained that their organization experienced a 98% efficacy rate against malicious inbound emails. This significantly reduced the number of malicious emails that reached user inboxes and offered significant productivity savings for IT security staff who monitored the malicious emails reported by end users. End users also reduced the time they previously spent verifying the legitimacy of emails.
In addition to this, Egress also offers automatic quarantining of suspicious email. The chief digital officer of a healthcare services provider mentioned that this capability helped their organization cut down its out-of-hours SOC costs by 25% in the first year alone, and they expected more savings as the solution continued to learn and enhance.
The solution was also able to reduce the number of breaches — both simple and sophisticated — experienced by customers. One of the customers interviewed mentioned the number of breaches went down from five to 10 per month to one to two per month since Egress was introduced. This led to significant savings around the investigation and remediation of such incidents.
Modeling and assumptions. Forrester estimates the following for the composite organization:
Risks. Efficiency gains are dependent on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $2.9 million.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Volume of inbound emails | Composite | 35,000,000 | 35,000,000 | 35,000,000 | |
| A2 | Volume of suspicious emails passing through | Interview | 400,000 | 400,000 | 400,000 | |
| A3 | Percentage reduction in suspicious emails received by end user | Interview | 98% | 98% | 98% | |
| A4 | Average time spent by end user in reviewing email | Interview | 0.04 | 0.04 | 0.04 | |
| A5 | Avg fully burdened salary of user (FTE) | TEI standard | $38 | $38 | $38 | |
| A6 | Subtotal: End user time savings | A2*A3*A4*A5 | $625,632 | $625,632 | $625,632 | |
| A7 | Volume of suspicious emails reported to IT Security team | 2%*A2 | 3200 | 3200 | 3200 | |
| A8 | Average time spent by security FTE in investigating email | Interview | 0.33 | 0.33 | 0.33 | |
| A9 | Percentage of effort saved | Interview | 50% | 50% | 50% | |
| A10 | Avg fully burdened salary of IT security FTE | TEI standard | $58 | $58 | $58 | |
| A11 | Subtotal: Security FTE productivity savings | A7*A8*A9*A10 | $30,624 | $30,624 | $30,624 | |
| A12 | SOC out of hours contract fee | Interview | $160,000 | $160,000 | $160,000 | |
| A13 | Reduction in out of hours contract fee due to automatic quarantining | Interview | 25% | 50% | 70% | |
| A14 | Subtotal: Savings in SOC out of hours reduction | A12*A13 | $40,000 | $80,000 | $112,000 | |
| A15 | Subotal: Savings in Security administration | A11+A14 | $70,624 | $110,624 | $142,624 | |
| A16 | Amount of breaches from inbound emails experienced annually | Interview | 84 | 84 | 84 | |
| A17 | Percentage of simple breaches | Assumption | 98% | 98% | 98% | |
| A18 | Average cost of remediation for simple breach | Interview | $5,000 | $5,000 | $5,000 | |
| A19 | Percentage reduction in simple breaches | Interview | 80% | 85% | 90% | |
| A20 | Avoided costs associated with simple breach | A16*A17*A18*A19 | $329,280 | $349,860 | $370,440 | |
| A21 | Percentage of material breaches | Assumption | 2% | 2% | 2% | |
| A22 | Percentage reduction in material breaches | Interview | 70% | 70% | 70% | |
| A23 | Avg cost of remediation and reporting labor cost per material breach | Interview | $175,000 | $175,000 | $175,000 | |
| A24 | Avoided costs associated with material breach | A16*A21*A22*A23 | $205,800 | $205,800 | $205,800 | |
| A25 | Subtotal: Avoided costs associated with breach prevention | A20+A24 | $535,080 | $555,660 | $576,240 | |
| At | Inbound email protection savings | A6+A15+A25 | $1,231,336 | $1,291,916 | $1,344,496 | |
| Risk adjustment | ↓10% | |||||
| Atr | Inbound email protection savings (risk-adjusted) | $1,108,202 | $1,162,724 | $1,210,046 | ||
| Three-year total: $3,480,973 | Three-year present value: $2,877,512 | |||||
Evidence and data. Egress’s outbound email protection solution used social graph and contextual machine learning technologies to model user behavior at the interviewees’ organizations. The solution then offered real-time advice to prevent user errors such as wrong attachments, misdirections, and data loss risks with outbound emails. The head of information security for a legal services organization mentioned that the organization experienced up to 1,500 instances of accidental misdirections per year, with three to four serious incidents per year. Some of these incidents required hours to remediate and rectify, which had an adverse effect on end-user productivity. These have now been avoided with Egress.
Another area of significant importance for interviewed customers was Egress's ability to prevent data loss incidents. One of the interviewees highlighted that in one quarter alone, Egress's content analysis capability helped them prevent 250 instances of accidental data loss as the solution identified issues and suggested corrections to email content to prevent incidents. The customer also shared a material data loss of this nature would result in work for an average of five days from a team of multiple resources across legal, compliance, human resources, and other concerned teams to manage and remediate the incident. With Egress, the organization could now avoid these costs.
Modeling and assumptions. Forrester estimates the following for the composite organization:
Risks. Efficiency gains are dependent on:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $2.7 million.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Total volume of outbound emails per year | Composite | 13,000,000 | 13,000,000 | ||
| B2 | Volume of potential misdirected emails per year | 0.02% of B1 | 2,300 | 2,300 | ||
| B3 | Investigation efforts per misdirected email (hours) | Interview | 8 | 8 | ||
| B4 | Fully loaded hourly IT security staff | TEI standard | $58 | $58 | ||
| B5 | Subtotal: Savings in misdirected email investigation | B2*B3*B4 | $1,067,200 | $1,067,200 | ||
| B6 | Misdirected incidents per year | Interview | 5 | 5 | ||
| B7 | Time spent to remediate misdirected email incident | Interview | 72 | 72 | ||
| B8 | Percentage reduction in misdirected email remediation | Interview | 90% | 90% | ||
| B9 | Subtotal: Savings in misdirected email incident remediation | B6*B7*B8*B4 | $18,792 | $18,792 | ||
| B10 | Volume of potential data loss events prevented by Egress | Interview | 1,600 | 1,600 | ||
| B11 | Percentage of simple data loss incidents | Assumption | 99% | 99% | ||
| B12 | Remediation efforts per simple data loss incident (hours) | Interview | 4 | 4 | ||
| B13 | Average fully loaded salary of data loss remediation team | TEI standard | $99 | $99 | ||
| B14 | Percentage reduction in data loss events | Interview | 95% | 95% | ||
| B15 | Subtotal: Avoided data loss remediation costs for simple incidents | B10*B11*B12*B13 *B14 | $595,901 | $595,901 | ||
| B16 | Percentage of material data loss incidents | Assumption | 1% | 1% | ||
| B17 | Remediation efforts per material data loss incident (hours) | Interview | 200 | 200 | ||
| B18 | Subtotal: Avoided data loss remediation costs for material incidents | B10*B13*B16*B17 | $316,800 | $316,800 | ||
| B19 | Subtotal: Avoided data loss remediation costs | B15+B19 | $912,701 | $912,701 | ||
| Bt | Outbound email protection savings | B5+B8+B14 | $0 | $1,998,693 | $1,998,693 | |
| Risk adjustment | ↓15% | |||||
| Btr | Outbound email protection savings (risk-adjusted) | $0 | $1,698,889 | $1,698,889 | ||
| Three-year total: $3,397,778 | Three-year present value: $2,680,441 | |||||
Evidence and data. The reporting and analysis capabilities offered by Egress allowed the interviewees’ organizations to analyze the threat landscape easier with customizable dynamic dashboards and metrics. The chief digital officer of a healthcare organization stated that the dashboard offered metrics and statistics that helped their organization publish internal reports, which saved up to 4 hours of effort per report.
Egress also offered insights that helped quantify human risk and offered significant time savings. The VP of global IT security of a financial services organization mentioned that their organization used to spend up to 12 hours per report to collate necessary data and generate actionable insights into human risk which is now reduced to 4 hours with the help of Egress’s insights.
Another key benefit interviewees highlighted was their organizations’ ability to save time and effort associated with answering security audit questions. The head of information security of a legal services organization stated that their organization used to have a dedicated FTE to provide responses to security audits mandated by their customers. After investment in Egress, the organization was able to elevate its overall security environment to meet higher levels of security compliance to the point where they could repurpose the resource for other value-add activities.
Modeling and assumptions. Forrester estimates the following for the composite organization:
Risks. Efficiency gains for this benefit are dependent on:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $300,000.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Time spent on creating reports in the past per year | Interview | 48 | 48 | 48 | |
| C2 | Percentage of time saved | Interview | 90% | 90% | 90% | |
| C3 | Fully loaded hourly CISO salary | TEI standard | $195 | $195 | $195 | |
| C4 | Subtotal: Time savings in report creation | C1*C2*C3 | $8,424 | $8,424 | $8,424 | |
| C5 | Time spent in creating human risk analysis report (hours/year) | Interview | 144 | 144 | 144 | |
| C6 | Percentage of time saved | Interview | 60% | 60% | 60% | |
| C7 | Fully loaded hourly IT security staff | TEI standard | $58 | $58 | $58 | |
| C8 | Subtotal: Time savings in human risk analysis | C5*C6*C7 | $5,011 | $5,011 | $5,011 | |
| C9 | Re-allocated resources for answering security audit question from clients/partners (FTE) | Interview | 1 | 1 | 1 | |
| C10 | Average fully loaded salary of IT security FTE | TEI standard | $120,640 | $120,640 | $120,640 | |
| C11 | Subtotal: Savings in answering security audit questions | C9*C10 | $120,640 | $120,640 | $120,640 | |
| Ct | Reporting, analysis and audit savings | C4 + C8 + C11 | $134,075 | $134,075 | $134,075 | |
| Risk adjustment | ↓10% | |||||
| Ctr | Reporting, analysis and audit savings (risk-adjusted) | $120,668 | $120,668 | $120,668 | ||
| Three-year total: $362,003 | Three-year present value: $300,083 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement Egress Intelligent Email Security and later realize additional uses and business opportunities, including:
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Dtr | Subtotal: Software license fees | $0 | $292,950 | $585,900 | $585,900 | $1,464,750 | $1,190,728 |
| Etr | Implementation & ongoing management costs | $5,104 | $3,381 | $61,248 | $33,814 | $103,547 | $84,201 |
| Total costs (risk-adjusted) | $5,104 | $296,331 | $647,148 | $619,714 | $1,568,297 | $1,274,929 |
Evidence and data. The primary costs associated with Egress Intelligent Email Security for the interviewees’ organizations were software license fees.
Modeling and assumptions. The license fees presented in this financial model were provided by interviewed decision-makers and adjusted to the composite organization’s characteristics and deployment approach. It leverages inbound protection, or Defend, in Year 1 and expands the use to outbound protection, or Prevent, in Year 2.
Risks. This cost may vary based on an organization’s regions, the number of inboxes protected, the type of modules deployed, packaging, exchange rates, and change over time.
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.19 million.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| D1 | License fee | Interview | $279,000 | $558,000 | $558,000 | ||
| Dt | Subtotal: Software license fees | D1 | $0 | $279,000 | $558,000 | $558,000 | |
| Risk adjustment | ↑5% | ||||||
| Dtr | Subtotal: Software license fees (risk-adjusted) | $0 | $292,950 | $585,900 | $585,900 | ||
| Three-year total: $1,464,750 | Three-year present value: $1,190,728 | ||||||
Evidence and data. Egress’s inbound security solution integrated transparently into Microsoft 365 via SMTP and Graph APIs at the interviewees’ organizations. Installation was executed with a deployment packager that created necessary groups, app registrations, connectors and mail flow rules required to complete the set up. Deployment could be staggered by group, geography, and organizational unit. Implementation of the outbound solution was also seamless for the interviewees’ organizations. The solution digested user emailing patterns silently during the initial implementation and used intelligent ML/AI to create its rules. It also offered additional customization around rule setting for the organizations’ needs.
Interviewees were positively surprised by how simple the tool’s implementation was, especially for the inbound email security solution. They started with a proof of capability (POC) phase without a requirement to purchase the solution. That lasted two to three weeks for inbound and a couple of months for the outbound solution. During this time, the organizations’ teams did phased testing, analysis, checked for false positives, created playbooks for the SOC teams, and created custom rules before a phased roll out to the full organization. The ongoing management for the solution was minimal after deployment. The interviewees’ organizations commented on the dedicated support that Egress provided both during the POC phase and after implementation.
Modeling and assumptions. For the composite organization, Forrester assumes:
Risks. Actual implementation and ongoing management costs may vary and can depend upon.
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $84,000.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| E1 | Fully loaded hourly IT security staff | TEI Standard | $58 | $58 | $58 | $58 | |
| E2 | Time spent on inbound implementation (hours) | Interview | 80 | ||||
| E3 | Subtotal: Inbound implementation costs | E1*E2 | $4,640 | ||||
| E4 | Time spent on outbound implementation (hours) | Interview | 430 | ||||
| E5 | Subtotal: Outbound implementation costs | E1*E14 | $24,940 | ||||
| E6 | Time spent on ongoing management | Interview | 53 | 530 | 530 | ||
| E7 | Subtotal: Ongoing management costs | E1*E6 | $3,074 | $30,740 | $30,740 | ||
| Et | Implementation & ongoing management costs | E3+E5+E7 | $4,640 | $3,074 | $55,680 | $30,740 | |
| Risk adjustment | ↑10% | ||||||
| Etr | Implementation & ongoing management costs (risk-adjusted) | $5,104 | $3,381 | $61,248 | $33,814 | ||
| Three-year total: $103,547 | Three-year present value: $84,201 | ||||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($5,104) | ($296,331) | ($647,148) | ($619,714) | ($1,568,297) | ($1,274,929) |
| Total benefits | $0 | $1,228,870 | $2,982,281 | $3,029,603 | $7,240,754 | $5,858,036 |
| Net benefits | ($5,104) | $932,539 | $2,335,133 | $2,409,889 | $5,672,457 | $4,583,107 |
| ROI | 359% | |||||
| Payback period (months) | <6 |
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Benefits represent the value delivered to the business by the product. The TEI methodology places equal weight on the measure of benefits and the measure of costs, allowing for a full examination of the effect of the technology on the entire organization.
Costs consider all expenses necessary to deliver the proposed value, or benefits, of the product. The cost category within TEI captures incremental costs over the existing environment for ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. Having the ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
1 Source: “The Enterprise Email Security Landscape, Q1 2023,” Forrester Research, Inc., February 2023.
2 Source: “The Forrester Wave™: Enterprise Email Security, Q2 2023,” Forrester Research, Inc., June 2023.
3 Source: Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s
technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Cookie Preferences
Accept Cookies
Decline
Close
This website uses cookies to deliver functionality and enhance your experience. GDPR requires that we obtain your consent before activating these cookies. Please accept the use of cookies or review your cookie settings now.
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.