A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY IBM Security, JUNE 2023
Switch between the study data and your custom data below. Answering the questions on the 'Custom Data' tab will allow you to customize the analysis and estimate the potential impact of using a Total Economic Impact Study.
To read Forrester's full analysis and customize the findings to your organization, please register below.
What is your organization's annual revenue?
How many total employees does your organization have?
To read Forrester's full analysis and customize the findings to your organization, please register below.
What is your organization's annual revenue?
How many total employees does your organization have?
As security environments become increasingly complex, threat actors wreak more havoc faster than ever, causing severe financial implications for the unprepared. With 34% of breaches caused by an external attack, taking a hacker’s perspective of an organization can significantly inform security strategies and policies.1 External attack surface management (EASM) tools provide vital insights to de-risk and mitigate exposures stemming from vulnerable external assets.
As part of a unified offensive security platform, IBM Security Randori provides a comprehensive view of an organization’s external attack surface. The IBM Security Randori platform consists of:
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Randori. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Randori on their organizations.
90%
Less vulnerability scanning
To better understand the benefits, costs, and risks associated with the investment, Forrester interviewed four representatives with experience using Randori. Forrester aggregated the interviewees’ experiences into a single composite organization with 10,000 knowledge workers, $10 billion in revenue, and 15,000 assets.
Prior to using Randori, interviewees cited experiences with complex and ephemeral external attack surfaces. The persistence of shadow IT led to a proliferation of “unknown unknowns” in the face of faster and increasingly hostile cyber foes. The interviewees’ organizations were early adopters of attack surface management with Randori the tool at the center of their exposure management programs.3
By leaning into a more mature security culture in the cloud, interviewed security leaders eliminated rote, manual processes with automation. Enhanced support for threat hunting from Randori helped interviewees’ organizations increase visibility and control over their externally-facing cyber assets, increasing confidence in security investments while streamlining expenditures. These improvements helped interviewees mitigate risk exposure, better prioritize risk response decisions, and act faster.
Consulting Team: Courtenay O’Connor, Nahida Nisa
Return on investment (ROI):
Benefits PV:
Net present value (NPV):
Payback (months):
COOKIE ACCEPTANCE IS REQUIRED TO REGISTER FOR ACCESS TO DIGITAL ASSET
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
For , avoided losses from an external attack could total .
For , SecOps rapid response efficiencies could total .
For , savings from augmented red team activities could total .
For , exposure analysis efficiencies could total .
For , a reduction in exposure-related help desk tickets could be worth .
For , avoided vulnerability scanning license fees could total .
For , savings on cybersecurity insurance could total .
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified in this study include:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
For , Randori subscription fees could total .
For , deployment and administration labor costs could total .
The representative interviews and financial analysis found that a composite organization experiences benefits of $2.55 million over three years versus costs of $633,000, adding up to a net present value (NPV) of $1.92 million and an ROI of 303%.
could experience benefits of over three years versus costs of , adding up to a net present value (NPV) of and an ROI of .
“As we use more cloud services online, we still find traveling sites. IBM Security Randori is continuously scanning, so each problem I may have has a smaller window for someone to attack.”
Security engineer, entertainment
Attacks will happen, and they will sometimes go unnoticed. Randori mitigates the impact of inevitable intrusions.
Daily investment in hardening the attack surface is vital to staying ahead of today’s worrisome cyber adversaries.
Before an attack can even occur, the composite organization fully achieves a positive return on the Randori investment.
This initial yield is achieved through multiple internal and external efficiencies in both capex and opex.
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment Randori.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that Randori can have on an organization.
Interviewed IBM stakeholders and Forrester analysts to gather data relative to Randori.
Interviewed four representatives at organizations using Randori to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by IBM and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in Randori.
IBM reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
IBM provided the customer names for the interviews but did not participate in the interviews.
Role | Industry | Region | Number Of External Assets |
---|---|---|---|
Chief information security officer (CISO) | Grocery store | US HQ, US reach | 100,000 |
Security engineer | Entertainment | North America HQ, global reach | 50,000 |
Head of cybersecurity | Professional services | North America HQ, global reach | 12,000 |
Information security manager | Manufacturing | North America HQ, global reach | 10,000 |
Prior to their investment in Randori, interviewees shared that their legacy security environments could no longer rely on traditional vulnerability management regimes due to pressures such as:
Lack of visibility. Interviewees described complex and ephemeral data estates. Shadow IT led to an increased level of unknowns in interviewees’ dynamic, rapidly-changing attack surfaces.
“Before Randori, we had limited visibility. There were probably dozens of instances where an application went to end of life and we removed it because we have a new application; but then, for some reason, that old application was not properly taken down.”
Information security manager, manufacturing
Reactive shifts to the cloud. Rapid digital transformation further exacerbated shadow IT in interviewees’ organizations’ prior environments. This lent unnecessary complexity to the security teams’ efforts to harden their organizations’ dynamic external attack surface.
“The speed at which the business wants to adopt the cloud can be challenging for information security because we don’t want to be playing catch-up, we want to be out in front.”
Information security manager, manufacturing
Inadequate tools for the job. Interviewees described manual processes to scan for cyber asset exposures which left their organizations vulnerable to an increasingly daunting threat landscape. Whether part of routine scanning, or in rapid response to an exposure “in the wild,” legacy technologies and the processes that appended them stymied SecOps resources’ efforts.
Supply chain risk. Two interviewees also described further information security challenges related to their physical supply chains:
“Our biggest pain point was improving our time to detect and time to respond as a security organization.”
Security engineer, entertainment
“All the indicators in the industry are saying that you can’t just sit back and not improve. You have to continue to keep pace and improve your defenses.”
Information security manager, manufacturing
Today, digital transformation has more companies thinking about when and how to move to the cloud, not if they should do so (see Figure 1). This has led to a rapid rise of cloud adoption, while leaving unprepared security organizations vulnerable to leading threats.
According to Forrester, increased cloud complexity is changing the way security teams defend and the emerging threats they face.4 External attacks can come from a number of vectors with software vulnerability exploitation at the top of the list (see Figure 2).
Cloud Adoption
Figure 1. In 2022, a majority of technology decision-makers planned to or were in the process of adopting a cloud deployment model.
Note: Numbers may not total 100% due to rounding.
Top Five Causes Of External Attacks
Figure 2. Top five causes of external attacks in 2021 can mitigated through effective EASM approaches.
Source: “Top Security Threats In 2022,” Forrester Research, Inc., April 8, 2022.
“Our goal was to become much more efficient in our operations, so that we could spend more time doing proactive security and threat hunting.”
CISO, grocery store
The interviewees searched for a solution that could enable a more proactive, mature security posture beyond vulnerability management to cover the ASM spectrum (see Figure 4).
Cyber asset | Granular, software-defined entities that include IP addresses, users, devices, code commits, security controls, applications, access policies, cloud configurations, and more. |
Attack surface management (ASM) | The process of continuously discovering, identifying, inventorying, and assessing the exposures of an entity’s IT asset estate. |
External attack surface management (EASM) | Tools or functionalities that continually scan for, discover, and enumerate internet-facing assets, establish the unique fingerprints of discovered assets, and identify exposures on both known and unknown assets. |
Cyber asset attack surface management (CAASM) | A tool or capability that delivers unified visibility across all known assets (internal, external, cloud, on-premises) for better identification of vulnerabilities and insufficient security controls. |
Figure 4. Attack surface management definitions per Forrester’s February 2022 report, “Tame The Asset Management Beast.”
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the four representatives that Forrester interviewed and is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. With headquarters in North America, the globally distributed company has a large infrastructure and a strong online and offline presence with an average of 15,000 external assets monitored on a regular basis. Operating in a highly regulated space, the composite organization has 10,000 knowledge workers and generates $10 billion in revenue annually.
Prior to Randori, the composite had a moderately mature security program, relying heavily on vulnerability management tools coupled with manual processes to research, contextualize, prioritize, and issue an average of 300 exposure-related tickets per month. The company outsourced a small number of penetration tests with limited in-house red/blue/purple team functions.
Deployment characteristics. With Randori, the composite organization evolves its security maturity to a more advanced, ASM-focused posture during the investment period.
Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
---|---|---|---|---|---|---|
Atr | Avoided losses from an external attack | |||||
Btr | SecOps rapid response efficiencies | |||||
Ctr | Savings from augmented red team activities | |||||
Dtr | Exposure analysis efficiencies | |||||
Etr | Reduction in exposure-related help desk tickets | |||||
Ftr | Avoided vulnerability scanning license fees | |||||
Gtr | Savings on cybersecurity insurance | |||||
Total benefits (risk-adjusted) |
“Part of Randori’s value is to mature our attack surface management by helping us to identify our shadow IT.”
Information security manager, manufacturing
Evidence and data. Randori helped interviewees locate a small but important number of undetected assets previously left exposed. Interviewees reported a decline in exposures that could lead to significant financial and brand impacts for their organizations.
“Randori helps us find our [outdated] sites and services that are no longer needed. It also shows how we look from the lens of the attacker.”
Security engineer, entertainment
Modeling and assumptions. The composite avoids losses from an external attack as follows:
The information provided suggests that may experience the following costs related to an external attack caused by an exposed externally facing cyber asset: loss of business due to system downtime totaling and efficiency losses from end-user downtime totaling .
The information provided suggests that might have cyber assets vulnerable to costly disruptions.
Based on the Randori deployment schedule of and the findings of the TEI case study, the window during which an exposed asset is vulnerable to an external attack could fall by in Year 1, in Year 2, and in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 25%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.5 million.
For , this benefit may have a three-year, risk-adjusted total PV of .
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
A1 | Number of vulnerable assets found with Randori | ||||
A2 | Loss of business due to system downtime during exposure-related external attack | ||||
A3 | End-user downtime during exposure-related external attack | ||||
A4 | Reduction potential window of an exposure-related external attacks with Randori | ||||
At | Avoided losses from an external attack | A1*(A2+A3)*A4 | |||
Risk adjustment | ↓25% | ||||
Atr | Avoided losses from an external attack (risk-adjusted) | ||||
Three-year total: | Three-year present value: |
“Randori prioritizes down into the medium-level threats, which can be chained together to cause breaches.”
CISO, grocery store
30%
Faster SecOps rapid response
Evidence and data. With increasing use of Randori, interviewees reduced the time it took rapid response teams to triage exposure-related issues.
Modeling and assumptions. The composite organization improves its rapid response to exposure-related incidents as follows:
According to the information provided, state dedicates inSecOps SecOps resources to identifying and triaging exposures.
Based on the Randori deployment schedule of state and the findings of the TEI case study, the time SecOps spends on exposure response could fall by Benefit2B2CFYear1 in Year 1, Benefit2B2CFYear2 in Year 2, Benefit2B2CFYear2 in Year 3.
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $522,000.
For state, this benefit may have a three-year, risk-adjusted total PV of Benefit2BtrCFPV.
On December 9, 2021, cybersecurity professionals learned of a critical vulnerability in the open source Apache code underpinning billions of devices. The CISO in the grocery store industry contemplated how Randori helped their organization respond to the vulnerability in a fraction of the time it would have taken without the platform: “One example that gave me my return on investment with Randori was Log4j. Had we not been able to identify it in time, it could have been the beginning of a major incident for us. Log4j came out on a Thursday night. Without Randori, it would realistically have taken 8 to 12 hours to detect. My team would have to scan our external environment, get all those results, figure out which ones are false positives, and act on them. That time is precious. With Randori, that Friday morning it was telling me we had systems that were vulnerable externally to Log4j. My team was able to pull those systems offline and get them remediated immediately. So, when my CEO called me Friday morning, I already identified the affected, externally facing-assets and informed that we’ve taken them offline and were actively remediating them.”
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
B1 | Number of SecOps resources fully dedicated to identifying and triaging exposures for remediation in prior environment | {{Benefit2B1Src}} | {{Benefit2B1CFYear1}} | {{Benefit2B1CFYear2}} | {{Benefit2B1CFYear3}} |
B2 | Percent reduction in SecOps time spent on exposure response | {{Benefit2B2Src}} | {{Benefit2B2CFYear1}} | {{Benefit2B2CFYear2}} | {{Benefit2B2CFYear3}} |
B3 | Hours of SecOps response avoided with Randori | {{Benefit2B3Src}} | {{Benefit2B3CFYear1}} | {{Benefit2B3CFYear2}} | {{Benefit2B3CFYear3}} |
B4 | Average fully burdened hourly rate per security resource | {{Benefit2B4Src}} | {{Benefit2B4CFYear1}} | {{Benefit2B4CFYear2}} | {{Benefit2B4CFYear3}} |
Bt | SecOps rapid response efficiencies | B3*B4 | {{Benefit2BtCFYear1}} | {{Benefit2BtCFYear2}} | {{Benefit2BtCFYear3}} |
Risk adjustment | ↓20% | ||||
Btr | SecOps rapid response efficiencies (risk-adjusted) | {{Benefit2BtrCFYear1}} | {{Benefit2BtrCFYear2}} | {{Benefit2BtrCFYear3}} | |
Three-year total: {{Benefit2BtrCFTotal}} | Three-year present value: {{Benefit2BtrCFPV}} |
Evidence and data. Interviewees noted that, particularly when deploying Randori Attack, their SecOps teams were able to reattribute time formerly spent detecting and triaging exposures to more proactive threat hunting, penetration testing, and red/blue/purple team exercises.
“I’m a big fan of the purple teaming concept, [and] I’ve been able to run red and blue teams together with Randori.”
Head of cybersecurity, professional services
Modeling and assumptions. The composite organization reaps savings from augmented red team activities as follows:
The information provided suggests that state may pay Benefit3C1CFYear2 in penetration testing fees from a managed service.
According to the information provided, state dedicates inHrsRed hours per week (or Benefit3C2CFYear1 hours annually) to red teaming functions.
Based on the Randori deployment schedule of state and the findings of the TEI case study, state could realize time savings on red teaming of Benefit3C3CFYear1 in Year 1, Benefit3C3CFYear2 in Year 2, and Benefit3C3CFYear3 in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $214,000.
For state, this benefit may have a three-year, risk-adjusted total PV of Benefit3CtrCFPV.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
C1 | Avoided penetration testing fees with Randori Attack Targeted | {{Benefit3C1Src}} | {{Benefit3C1CFYear1}} | {{Benefit3C1CFYear2}} | {{Benefit3C1CFYear3}} |
C2 | Hours dedicated to red teaming functions in prior environment | {{Benefit3C2Src}} | {{Benefit3C2CFYear1}} | {{Benefit3C2CFYear2}} | {{Benefit3C2CFYear3}} |
C3 | Reduction in manual red-teaming with Randori | {{Benefit3C3Src}} | {{Benefit3C3CFYear1}} | {{Benefit3C3CFYear2}} | {{Benefit3C3CFYear3}} |
C4 | Fully burdened hourly rate of a red team analyst | {{Benefit3C4Src}} | {{Benefit3C4CFYear1}} | {{Benefit3C4CFYear2}} | {{Benefit3C4CFYear3}} |
Ct | Savings from augmented red team activities | C1+(C2*C3*C4) | {{Benefit3CtCFYear1}} | {{Benefit3CtCFYear2}} | {{Benefit3CtCFYear3}} |
Risk adjustment | ↓15% | ||||
Ctr | Savings from augmented red team activities (risk-adjusted) | {{Benefit3CtrCFYear1}} | {{Benefit3CtrCFYear2}} | {{Benefit3CtrCFYear3}} | |
Three-year total: {{Benefit3CtrCFTotal}} | Three-year present value: {{Benefit3CtrCFPV}} |
Evidence and data. Compared to their prior environments, interviewees reported between 50% and approximately 95% reductions in manual effort with Randori’s continuous security monitoring.
“We’re no longer just looking at what we know we own. We can now see residual breadcrumbs on the internet of what we potentially own and need to make sure is secure. This freed up time to dig deeper into risks.”
Information security manager, manufacturing
“Randori has dramatically reduced the time it takes to scan our environment. The team spends about 50% less time now because it performs continuous reconnaissance of our external environment for us. Then it prioritizes what we need to care about.”
CISO, grocery store
Modeling and assumptions. The composite improves its exposure analysis effort as follows:
According to the information provided, SecOps resources at state spend inHrsReg hours per week (or Benefit4D1CFYear1 hours annually) on regular scanning and reporting activities.
Based on the Randori deployment schedule of state and the findings of the TEI case study, state could realize time savings on vulnerability scanning of Benefit4D2CFYear1 in Year 1, Benefit4D2CFYear2 in Year 2, and Benefit4D2CFYear3 in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 20%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $103,000.
For state, this benefit may have a three-year, risk-adjusted total PV of Benefit4DtrCFPV.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
D1 | Security operations hours spent on regular scanning and reporting in prior environment | {{Benefit4D1Src}} | {{Benefit4D1CFYear1}} | {{Benefit4D1CFYear2}} | {{Benefit4D1CFYear3}} |
D2 | Percent reduction in hours of vulnerability scanning per year with Randori | {{Benefit4D2Src}} | {{Benefit4D2CFYear1}} | {{Benefit4D2CFYear2}} | {{Benefit4D2CFYear3}} |
D3 | Average fully burdened hourly rate per security resource | {{Benefit4D3Src}} | {{Benefit4D3CFYear1}} | {{Benefit4D3CFYear2}} | {{Benefit4D3CFYear3}} |
Dt | Exposure analysis efficiencies | D1*D2*D3 | {{Benefit4DtCFYear1}} | {{Benefit4DtCFYear2}} | {{Benefit4DtCFYear3}} |
Risk adjustment | ↓20% | ||||
Dtr | Exposure analysis efficiencies (risk-adjusted) | {{Benefit4DtrCFYear1}} | {{Benefit4DtrCFYear2}} | {{Benefit4DtrCFYear3}} | |
Three-year total: {{Benefit4DtrCFTotal}} | Three-year present value: {{Benefit4DtrCFPV}} |
Evidence and data. With Randori, interviewees had fewer exposures requiring help desk tickets.
“Randori definitely helps a lot with tickets. It’s an order of magnitude better compared to a year ago, whereas I had maybe hundreds, I’m down to tens.”
Security engineer, entertainment
Exposure-related help desk tickets
Before: 10,800
After: 2,880
Modeling and assumptions. With Randori, the composite organization reduces exposure-related help desk tickets as follows:
According to the information provided, state processes inTickets exposure-related help desk tickets per month (or Benefit5E1CFYear1 tickets annually).
Based on the Randori deployment schedule of state and the findings of the TEI case study, state could realize reductions in exposure-related help desk of Benefit5E2CFYear1 in Year 1, Benefit5E2CFYear2 in Year 2, and Benefit5E2CFYear3 in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $175,000.
For state, this benefit may have a three-year, risk-adjusted total PV of Benefit5EtrCFPV.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
E1 | Number of exposure-related IT help desk tickets in prior environment | {{Benefit5E1Src}} | {{Benefit5E1CFYear1}} | {{Benefit5E1CFYear2}} | {{Benefit5E1CFYear3}} |
E2 | Percent reduction in exposure-related IT help desk tickets with Randori | {{Benefit5E2Src}} | {{Benefit5E2CFYear1}} | {{Benefit5E2CFYear2}} | {{Benefit5E2CFYear3}} |
E3 | Number of IT tickets avoided with Randori | {{Benefit5E3Src}} | {{Benefit5E3CFYear1}} | {{Benefit5E3CFYear2}} | {{Benefit5E3CFYear3}} |
E4 | Cost per security-related ticket | {{Benefit5E4Src}} | {{Benefit5E4CFYear1}} | {{Benefit5E4CFYear2}} | {{Benefit5E4CFYear3}} |
Et | Reduction in exposure-related help desk tickets | E3*E4 | {{Benefit5EtCFYear1}} | {{Benefit5EtCFYear2}} | {{Benefit5EtCFYear3}} |
Risk adjustment | ↓10% | ||||
Etr | Reduction in exposure-related help desk tickets (risk-adjusted) | {{Benefit5EtrCFYear1}} | {{Benefit5EtrCFYear2}} | {{Benefit5EtrCFYear3}} | |
Three-year total: {{Benefit5EtrCFTotal}} | Three-year present value: {{Benefit5EtrCFPV}} |
Evidence and data. Randori functionalities exceeded the capabilities of their traditional vulnerability scanners. This reduced their reliance on vulnerability scans, and consolidated license costs for legacy vulnerability scanners.
“Randori sees things that would be lost in the noise of regular vulnerability scanning.”
Information security manager, manufacturing
Modeling and assumptions. The composite organization avoids legacy vulnerability scanning license costs as follows:
The information provided suggests that state may spend Benefit6F1CFYear1 on vulnerability scanning license fees.
Based on the findings of the TEI case study, state could realize reductions in vulnerability scanning license fees of Benefit6F2CFYear1 in Year 1, Benefit6F2CFYear2 in Year 2, and Benefit6F2CFYear3 in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $41,000.
For state, this benefit may have a three-year, risk-adjusted total PV of Benefit6FtrCFPV.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
F1 | Vulnerability scanning license fees in prior environment | {{Benefit6F1Src}} | {{Benefit6F1CFYear1}} | {{Benefit6F1CFYear2}} | {{Benefit6F1CFYear3}} |
F2 | Percent reduction in vulnerability scanning license fees with Randori | {{Benefit6F2Src}} | {{Benefit6F2CFYear1}} | {{Benefit6F2CFYear2}} | {{Benefit6F2CFYear3}} |
Ft | Avoided vulnerability scanning license fees | F1*F2 | {{Benefit6FtCFYear1}} | {{Benefit6FtCFYear2}} | {{Benefit6FtCFYear3}} |
Risk adjustment | ↓10% | ||||
Ftr | Avoided vulnerability scanning license fees (risk-adjusted) | {{Benefit6FtrCFYear1}} | {{Benefit6FtrCFYear2}} | {{Benefit6FtrCFYear3}} | |
Three-year total: {{Benefit6FtrCFTotal}} | Three-year present value: {{Benefit6FtrCFPV}} |
Evidence and data. The CISO in the grocery store industry reported that their organization reduced cyber insurance premiums with Randori. The interviewees relayed how underpinning their organization’s broader ASM effort program in Randori reduced cyber risk in the eyes of their insurers, lowering their premiums. The interviewee noted, “We just met with our insurance consulting group and received a 22% reduction on our premium, which was unheard of, so they were really impressed.”
“Our attack surface management program with Randori was a big hit with our underwriters. They loved it. It helped us get coverage this year, and another discount from last year.”
CISO, grocery store
Modeling and assumptions. The composite reduces cyber insurance costs as follows:
According to the information provided, state pays inPremiums in annual cybersecurity insurance premiums.
Based on the Randori deployment schedule of state and the findings of the TEI case study, state could realize reductions in cybersecurity insurance premiums of Benefit7G2CFYear1 in Year 1, Benefit7G2CFYear2 in Year 2, and Benefit7G2CFYear3 in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this benefit:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $27,000.
For state, this benefit may have a three-year, risk-adjusted total PV of Benefit7GtrCFPV.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|
G1 | Cyber insurance premiums in prior environment | {{Benefit7G1Src}} | {{Benefit7G1CFYear1}} | {{Benefit7G1CFYear2}} | {{Benefit7G1CFYear3}} |
G2 | Percent reduction in cyber insurance premiums attributed with Randori | {{Benefit7G2Src}} | {{Benefit7G2CFYear1}} | {{Benefit7G2CFYear2}} | {{Benefit7G2CFYear3}} |
Gt | Savings on cybersecurity insurance | G1*G2 | {{Benefit7GtCFYear1}} | {{Benefit7GtCFYear2}} | {{Benefit7GtCFYear3}} |
Risk adjustment | ↓10% | ||||
Gtr | Savings on cybersecurity insurance (risk-adjusted) | {{Benefit7GtrCFYear1}} | {{Benefit7GtrCFYear2}} | {{Benefit7GtrCFYear3}} | |
Three-year total: {{Benefit7GtrCFTotal}} | Three-year present value: {{Benefit7GtrCFPV}} |
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
Cleaner audits and streamlined mergers and acquisitions (M&A). Randori helped the interviewees gain a better view of their auditing and M&A efforts.
Further time savings and quality improvements from automation. Randori allowed interviewees to improve consistency while saving time through automated policies to accept a certain level of risk for predetermined applications.
More collaborative, informed approach to risk. Improved security team collaboration led some interviewees to observe their organizations assume a stronger and more informed risk posture.
Upskilling for newer hires. Randori’s ability to provide the perspective of an attacker helped some interviewees improve their defensive abilities.
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement Randori and later realize additional uses and business opportunities, including security tool validation and optimized security stack.
With Randori’s multiple functions, some interviewees could eliminate overlapping software license and maintenance costs while streamlining and validating the other tools in their tech stack.
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
---|---|---|---|---|---|---|---|
Htr | Randori subscription fees | {{Cost1HtrCFYear0}} | {{Cost1HtrCFYear1}} | {{Cost1HtrCFYear2}} | {{Cost1HtrCFYear3}} | {{Cost1HtrCFTotal}} | {{Cost1HtrCFPV}} |
Itr | Deployment and administration | {{Cost2ItrCFYear0}} | {{Cost2ItrCFYear1}} | {{Cost2ItrCFYear2}} | {{Cost2ItrCFYear3}} | {{Cost2ItrCFTotal}} | {{Cost2ItrCFPV}} |
Total costs (risk-adjusted) | {{CostTotalCFYear0}} | {{CostTotalCFYear1}} | {{CostTotalCFYear2}} | {{CostTotalCFYear3}} | {{CostTotalCFTotal}} | {{CostTotalCFPV}} |
Evidence and data. All interviewees’ engagement with Randori began with the Recon platform. Three then later upgraded to include Randori Attack, while the fourth interviewee was in the process of considering the Attack platform.
Modeling and assumptions. The composite deploys Recon in Year 1 and includes Attack in Years 2 and 3. Its fees are based on the number of knowledge workers it maintains, averaging 10,000 over the three-year period.
Pricing may vary. Contact Randori for additional details.
The information provided suggests that state might pay Randori subscription fees of Cost1H1CFYear1 in Year 1, Cost1H1CFYear2 in Year 2, and Cost1H1CFYear3 in Year 3. These estimates are automated and do NOT constitute a quote. Pricing may vary. Contact Randori for additional details.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $621,000.
For state, this cost may have a three-year, risk-adjusted total PV of Cost1HtrCFPV .
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
H1 | Randori subscription fees | {{Cost1H1Src}} | {{Cost1H1CFYear0}} | {{Cost1H1CFYear1}} | {{Cost1H1CFYear2}} | {{Cost1H1CFYear3}} |
Ht | Randori subscription fees | H1 | {{Cost1HtCFYear0}} | {{Cost1HtCFYear1}} | {{Cost1HtCFYear2}} | {{Cost1HtCFYear3}} |
Risk adjustment | ↑10% | |||||
Htr | Randori subscription fees (risk-adjusted) | {{Cost1HtrCFYear0}} | {{Cost1HtrCFYear1}} | {{Cost1HtrCFYear2}} | {{Cost1HtrCFYear3}} | |
Three-year total: {{Cost1HtrCFTotal}} | Three-year present value: {{Cost1HtrCFPV}} |
Evidence and data. Interviewees described various experiences deploying and administering Randori.
Deployment. Interviewees shared that the initial deployment process for Randori Recon took approximately one month with Attack coming online in later years for three interviewees.
Administration. Administrative costs for interviewees related to ongoing system administration and calibration. These costs also increased when the three interviewees added Attack to their Randori Recon configuration.
“The ramp up to full value is pretty fast. Within a month, we were confident with how to engage the tool.”
Information security manager, manufacturing
Modeling and assumptions. Forrester assumes the following for the composite organization:
The information provided suggests that during the initial Randori Recon deployment period, state might commit Cost2I1CFYear0 hours of security resource time for technical deployment and product tuning as well as Cost2I2CFYear0 security resources to participate in 4 hours of training each.
The information provided suggests that state might devote the following number of security resource hours to Randori monthly: system administration time of Cost2I6CFYear1 hours in Year 1, Cost2I6CFYear2 hours in Year 2, and Cost2I6CFYear3 hours in Year 3; calibration time of Cost2I7CFYear1 hours in Year 1, Cost2I7CFYear2 hours in Year 2, and Cost2I7CFYear3 hours in Year 3.
Risks. Forrester recognizes that these results may not be representative of all experiences. The following factors may impact this cost:
Results. To account for these risks, Forrester adjusted this cost upward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $13,000.
For state, this cost may have a three-year, risk-adjusted total PV of Cost2ItrCFPV.
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
I1 | Total of hours of technical deployment and product tuning | {{Cost2I1Src}} | {{Cost2I1CFYear0}} | {{Cost2I1CFYear1}} | {{Cost2I1CFYear2}} | {{Cost2I1CFYear3}} |
I2 | Number of deployment security resources involved in deployment | {{Cost2I2Src}} | {{Cost2I2CFYear0}} | {{Cost2I2CFYear1}} | {{Cost2I2CFYear2}} | {{Cost2I2CFYear3}} |
I3 | Number of hours of training per security resource | {{Cost2I3Src}} | {{Cost2I3CFYear0}} | {{Cost2I3CFYear1}} | {{Cost2I3CFYear2}} | {{Cost2I3CFYear3}} |
I4 | Average fully burdened hourly rate per security resource | {{Cost2I4Src}} | {{Cost2I4CFYear0}} | {{Cost2I4CFYear1}} | {{Cost2I4CFYear2}} | {{Cost2I4CFYear3}} |
I5 | Subtotal: Deployment and training | (I1+(I2*I3))*I4 | {{Cost2I5CFYear0}} | {{Cost2I5CFYear1}} | {{Cost2I5CFYear2}} | {{Cost2I5CFYear3}} |
I6 | Hours of monthly system administration | {{Cost2I6Src}} | {{Cost2I6CFYear0}} | {{Cost2I6CFYear1}} | {{Cost2I6CFYear2}} | {{Cost2I6CFYear3}} |
I7 | Hours of monthly calibration with Randori | {{Cost2I7Src}} | {{Cost2I7CFYear0}} | {{Cost2I7CFYear1}} | {{Cost2I7CFYear2}} | {{Cost2I7CFYear3}} |
I8 | Average fully burdened hourly rate per security resource | {{Cost2I8Src}} | {{Cost2I8CFYear0}} | {{Cost2I8CFYear1}} | {{Cost2I8CFYear2}} | {{Cost2I8CFYear3}} |
I9 | Subtotal: Product administration | (I6+I7)*I8 | {{Cost2I9CFYear0}} | {{Cost2I9CFYear1}} | {{Cost2I9CFYear2}} | {{Cost2I9CFYear3}} |
It | Deployment and administration | I5+I9 | {{Cost2ItCFYear0}} | {{Cost2ItCFYear1}} | {{Cost2ItCFYear2}} | {{Cost2ItCFYear3}} |
Risk adjustment | ↑15% | |||||
Itr | Deployment and administration (risk-adjusted) | {{Cost2ItrCFYear0}} | {{Cost2ItrCFYear1}} | {{Cost2ItrCFYear2}} | {{Cost2ItrCFYear3}} | |
Three-year total: {{Cost2ItrCFTotal}} | Three-year present value: {{Cost2ItrCFPV}} |
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Benefits represent the value delivered to the business by the product. The TEI methodology places equal weight on the measure of benefits and the measure of costs, allowing for a full examination of the effect of the technology on the entire organization.
Costs consider all expenses necessary to deliver the proposed value, or benefits, of the product. The cost category within TEI captures incremental costs over the existing environment for ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. Having the ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The present or current value of (discounted) cost and benefit estimates given at an interest rate (the discount rate). The PV of costs and benefits feed into the total NPV of cash flows.
The present or current value of (discounted) future net cash flows given an interest rate (the discount rate). A positive project NPV normally indicates that the investment should be made unless other projects have higher NPVs.
A project’s expected return in percentage terms. ROI is calculated by dividing net benefits (benefits less costs) by costs.
The interest rate used in cash flow analysis to take into account the time value of money. Organizations typically use discount rates between 8% and 16%.
The breakeven point for an investment. This is the point in time at which net benefits (benefits minus costs) equal initial investment or cost.
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
1 Source: Forrester’s Security Survey, 2022.
2 Randori Recon is the main platform included in all subscriptions. Randori Attack can be added onto the Recon platform for additional capabilities in penetration test and internal attack surface reconnaissance.
3 Source: “Find And Cover Your Assets With Attack Surface Management,” Forrester Research, Inc. January 6, 2022
4 Source: “Top Cybersecurity Threats In 2023,” Forrester Research, Inc., April 16, 2023.
5 Ibid.
Forrester provides independent and objective research-based consulting to help leaders deliver key transformation outcomes. Fueled by our customer-obsessed research, Forrester’s seasoned consultants partner with leaders to execute on their priorities using a unique engagement model that tailors to diverse needs and ensures lasting impact. For more information, visit forrester.com/consulting.
© Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester®, Technographics®, Forrester Wave, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies.
Cookie Preferences
Accept Cookies
Decline
Close
This website uses cookies to deliver functionality and enhance your experience. GDPR requires that we obtain your consent before activating these cookies. Please accept the use of cookies or review your cookie settings now.
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.