A FORRESTER TOTAL ECONOMIC IMPACT STUDY COMMISSIONED BY SIMSPACE, MARCH 2025
Cyber range solutions prepare cybersecurity teams for cyberattacks by taking them through simulated, realistic exercises and testing scenarios. Large organizations in vulnerable industries are turning to cyber range solutions to supplement or replace other forms of security training as well as to engage in security testing. These solutions enable security staff to save time in detecting and remediating cyberthreats, as well as assist security teams in testing new tools and developing detections and alerts for new threats and vulnerabilities.
SimSpace provides cyber ranges that enable realistic simulation exercises and testing against cyberattacks, along with guidance and evaluation services. Large organizations can turn to SimSpace to run these cyber drills to train, test, and prepare their security teams to quickly and efficiently defend against evolving threats. SimSpace also provides other cyber range testing and training use cases for testing tools, tactics, and policies, as well as course- and lab-based training for security staff.
SimSpace commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying SimSpace.1 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SimSpace on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed five decision-makers with experience using SimSpace. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a global financial services organization with 20,000 employees and revenue of $25 billion per year.
Interviewees said that prior to using SimSpace, their organizations lacked a comprehensive way to put their cybersecurity teams through real-world training scenarios. They also lacked controlled environments for testing new security tools and tactics. The interviewees’ organizations had implemented a full stack of monitoring and detection tools but had not conducted comprehensive testing with their entire teams. Previously, they conducted mainly classroom and on-the-job training with security operations staff and were looking to raise their game with simulated, full-scope attack scenarios.
After the investment in SimSpace, the interviewees stated their teams were far better prepared to defend against cyberattacks and generally exhibited higher engagement and job satisfaction. Beyond the cyber drills, interviewees’ organizations that used a SimSpace cyber range in a lab environment realized efficiencies and other savings in managing their security tools and tactics.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
Unquantified benefits. Benefits that provide value for the composite organization but are not quantified for this study include the following:
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
The representative interviews and financial analysis found that the composite organization experiences benefits of $3.9 million over three years versus costs of $1.7 million, adding up to a net present value (NPV) of $2.2 million and an ROI of 127%.
Return on investment (ROI)
Benefits PV
Net present value (NPV)
Payback
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in SimSpace cybersecurity skills and training platforms.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that SimSpace cybersecurity skills and training platforms can have on an organization.
Interviewed SimSpace stakeholders and Forrester analysts to gather data relative to its use in practice.
Interviewed five people at organizations using SimSpace to obtain data about costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by SimSpace and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in SimSpace.
SimSpace reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
SimSpace provided the customer names for the interviews but did not participate in the interviews.
Consulting Team:
Jonathan Whaling
| Role | Industry | Region | Annual Revenue | Number Of Employees | |
|---|---|---|---|---|---|
| Head of vulnerability and patch management | Financial services | North America | $82 billion | 225,000 | |
| VP, cybersecurity engineering | Mortgage financing | North America | $29 billion | 8,000 | |
| Director of information security | Insurance and investment | North America | $46 billion | 25,000 | |
| VP, incident response leader | Credit card processing | North America | $24 billion | 20,000 | |
| Professor | Education | North America | $800 million (est.) | 8,500 | |
Interviewees’ organizations faced challenges in creating realistic testing environments, evaluating the efficacy of new tools, and ensuring their teams were adequately prepared for cyberthreats. Existing training and testing methods presented limitations for cybersecurity teams. With an ongoing focus on preparedness for cybersecurity threats, some of the interviewees noted their organizations hired new executives to lead these efforts.
The interviewees noted how their organizations struggled with common challenges, including:
The interviewees’ organizations searched for a solution that could:
Most of the interviewees said their organizations did not go through a formal evaluation and selection process for SimSpace. Instead, CISOs at their organizations had familiarity with SimSpace from previous employers and knew about its long-standing use in the United States Department of Defense. Interviewees noted other organization-specific reasons for choosing SimSpace, including the following:
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the interviewees’ organizations, and it is used to present the aggregate financial analysis in the next section. The composite organization has the following characteristics:
Description of composite. The composite is a global, multibillion-dollar consumer and business banking organization that provides a range of financial services products, including transaction accounts, savings accounts, and a variety of credit products. The composite organization is based in the US with 20,000 employees worldwide. It has 150 employees on its security staff, which is based on three continents. Its annual security budget is $35 million, which includes software, staff, and outside services.
Deployment characteristics. There is no deployment period for SimSpace as it is a cloud-based service. The composite spends about two to three weeks preparing for full-scale cyber drills twice a year. Smaller, more focused drills require a week or less of prep time. These activities included the following:
The composite also uses SimSpace in a lab environment, which does not have event preparation activities per se. Rather, the lab is used on an ongoing basis by one or a few engineers at a time. The lab is set up to mimic the production environment, so individual security engineers use it as part of their processes to test new TTPs or perform proofs of concept (POCs) on new security tools or modules.
| Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|
| Atr | Incremental productivity improvement per cybersecurity engineer | $1,056,580 | $1,188,652 | $1,320,725 | $3,565,957 | $2,935,164 |
| Btr | Reduced exposure to breaches due to faster detection and remediation of incidents | $131,704 | $153,712 | $175,719 | $461,135 | $378,786 |
| Ctr | Reduced annual training costs for cybersecurity teams | $159,375 | $159,375 | $159,375 | $478,125 | $396,342 |
| Dtr | Reduced exposure of a likely security breach due to accelerated tool deployment | $54,782 | $54,782 | $54,782 | $164,346 | $136,235 |
| Etr | Time savings from developing threat detections in lab environment | $18,360 | $18,360 | $18,360 | $55,080 | $45,659 |
| Total benefits (risk-adjusted) | $1,420,801 | $1,574,881 | $1,728,961 | $4,724,643 | $3,892,186 | |
Evidence and data. Interviewees noted cyber drills offered realistic simulations of various cyberthreats and cyberattacks. This allowed security employees to experience and understand the complexities of different attack vectors, learn how to detect and respond to them, and develop effective mitigation strategies.
Modeling and assumptions. Forrester assumes the following about the composite organization:
Risks. The expected financial impact of this benefit is subject to risks and variation based on the following factors:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $2.9 million.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| A1 | Cybersecurity FTEs | Composite | 150 | 150 | 150 | |
| A2 | Fully burdened daily rate for a cybersecurity engineer | TEI standard | $545 | $545 | $545 | |
| A3 | Percentage of cybersecurity team involved in incident response | Forrester research | 38% | 38% | 38% | |
| A4 | Percentage of time devoted to incident response | TEI assumption | 75% | 75% | 75% | |
| A5 | Mean number of data breaches per year | Forrester research | 2.6 | 2.6 | 2.6 | |
| A6 | Average MTTR before SimSpace (days) | Forrester research | 51.3 | 51.3 | 51.3 | |
| A7 | Percentage improvement in MTTR | Interviews | 40% | 45% | 50% | |
| At | Incremental productivity improvement per cybersecurity engineer | A1*A2*A3*A4*A5* A6*A7 | $1,243,035 | $1,398,414 | $1,553,794 | |
| Risk adjustment | ↓15% | |||||
| Atr | Incremental productivity improvement per cybersecurity engineer (risk-adjusted) | $1,056,580 | $1,188,652 | $1,320,725 | ||
| Three-year total: $3,565,957 | Three-year present value: $2,935,164 | |||||
Evidence and data. The risk and cost of a security breach was top-of-mind for all the interviewees’ organizations. Interviewees cited the financial impact of a breach, damage to their organizations’ reputations, and operational disruptions as potential risks and losses. Interviewees were concerned about business continuity, loss of reputation and trust, and direct costs associated with restoring systems and data.
Modeling and assumptions. Forrester assumes the following about the composite organization:
Risks. The expected financial impact of this benefit is subject to risks and variation based on the following factors:
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $379,000.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| B1 | Likelihood of experiencing one or more breaches | Forrester research | 54% | 54% | 54% | |
| B2 | Mean cumulative cost of breaches (per day) | Forrester research | $9,274 | $9,274 | $9,274 | |
| B3 | Average MTTD before SimSpace (days) | Forrester research | 52.1 | 52.1 | 52.1 | |
| B4 | Percentage improvement in MTTD | Interviews | 20% | 25% | 30% | |
| B5 | Subtotal: Reduced exposure due to faster detection | B1*B2*B3*B4 | $52,183 | $65,229 | $78,274 | |
| B6 | Average MTTR before SimSpace (days) | Forrester research | 51.3 | 51.3 | 51.3 | |
| B7 | Percentage improvement in MTTR | Interviews | 40% | 45% | 50% | |
| B8 | Subtotal: Reduced exposure due to faster remediation | B1*B2*B6*B7 | $102,763 | $115,609 | $128,454 | |
| Bt | Reduced exposure to breaches due to faster detection and remediation of incidents | B5+B8 | $154,946 | $180,838 | $206,728 | |
| Risk adjustment | ↓15% | |||||
| Btr | Reduced exposure to breaches due to faster detection and remediation of incidents (risk-adjusted) | $131,704 | $153,712 | $175,719 | ||
| Three-year total: $461,135 | Three-year present value: $378,786 | |||||
Evidence and data. While not all interviewees said their organizations claimed a reduction in training expenses, those that did reported significant savings after switching to SimSpace as the primary training provider.
Modeling and assumptions. Forrester assumes the following about the composite organization:
Risks. The expected financial impact of this benefit is subject to risks and variation based on the training budgets, which will vary based on several organizational factors.
Results. To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $396,000.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| C1 | Cybersecurity FTEs | Composite | 150 | 150 | 150 | |
| C2 | Annual training costs per FTE | Interviews | $2,500 | $2,500 | $2,500 | |
| C3 | Reduction in training costs after SimSpace | Interviews | 50% | 50% | 50% | |
| Ct | Reduced annual training costs for cybersecurity teams | C1*C2*C3 | $187,500 | $187,500 | $187,500 | |
| Risk adjustment | ↓15% | |||||
| Ctr | Reduced annual training costs for cybersecurity teams (risk-adjusted) | $159,375 | $159,375 | $159,375 | ||
| Three-year total: $478,125 | Three-year present value: $396,342 | |||||
Evidence and data. According to interviewees, integrating new tools into their organizations’ existing security ecosystem often required significant effort and expertise. The interviewees’ organizations needed to verify that new tools would not disrupt current operations or conflict with other security solutions. This included configuring tools to work seamlessly with other security measures and ensuring they could effectively communicate and share data. There were concerns about the potential impact of new tools on system performance. To address this, the interviewees’ organizations used the SimSpace cyber range in a variety of ways:
Modeling and assumptions. Forrester assumes the following about the composite organization:
Risks. The expected financial impact of this benefit is subject to risks and variation based on the following factors:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $136,000.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| D1 | Likelihood of experiencing one or more breaches | Forrester research | 54% | 54% | 54% | |
| D2 | Mean cumulative cost of breaches | Forrester research | $3,385,000 | $3,385,000 | $3,385,000 | |
| D3 | Reduced risk of a breach per new tool | Interviews | 10% | 10% | 10% | |
| D4 | Acceleration in production deployment time | Interviews | 33.3% | 33.3% | 33.3% | |
| Dt | Reduced exposure of a likely security breach due to accelerated tool deployment | D1*D2*D3*D4 | $60,869 | $60,869 | $60,869 | |
| Risk adjustment | ↓10% | |||||
| Dtr | Reduced exposure of a likely security breach due to accelerated tool deployment (risk-adjusted) | $54,782 | $54,782 | $54,782 | ||
| Three-year total: $164,346 | Three-year present value: $136,235 | |||||
Evidence and data. The VP, incident response leader at the credit card processing organization described a use case specific to the lab environment was the development of threat detections and alerts in the lab rather than in a production environment. This interviewee said their organization previously built detections in production, which meant security operation center (SOC) analysts had to respond to false positives and then sort those out with the detection engineers.
Modeling and assumptions. Forrester assumes the following about the composite organization:
Risks. The expected financial impact of this benefit is subject to risks and variation based on the following factors:
Results. To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $46,000.
| Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|
| E1 | Number of detections per month | Interviews | 50 | 50 | 50 | |
| E2 | Production time saved per detection (hours) | Interviews | 0.5 | 0.5 | 0.5 | |
| E3 | Number of hours saved per year | E1*E2*12 | 300 | 300 | 300 | |
| E4 | Fully burdened hourly rate for a cybersecurity engineer | TEI standard | $68 | $68 | $68 | |
| Et | Time savings from developing threat detections in lab environment | E3*E4 | $20,400 | $20,400 | $20,400 | |
| Risk adjustment | ↓10% | |||||
| Etr | Time savings from developing threat detections in lab environment (risk-adjusted) | $18,360 | $18,360 | $18,360 | ||
| Three-year total: $55,080 | Three-year present value: $45,659 | |||||
Interviewees mentioned the following additional benefits that their organizations experienced but were not able to quantify:
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might partner with SimSpace and later realize additional uses and business opportunities, including:
Beyond the use cases described in this report, SimSpace cyber ranges can be used in other ways, such as the following:
Additional information on SimSpace use cases not encountered as part of this research may be found on the SimSpace website.
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
| Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
|---|---|---|---|---|---|---|---|
| Ftr | Annual subscription fees | $0 | $525,000 | $525,000 | $525,000 | $1,575,000 | $1,305,597 |
| Gtr | Maintenance of cyber range and planning for events | $9,724 | $60,782 | $60,782 | $60,782 | $192,070 | $160,880 |
| Htr | Annual travel costs for cyber drill events | $0 | $99,000 | $99,000 | $99,000 | $297,000 | $246,198 |
| Total costs (risk-adjusted) | $9,724 | $684,782 | $684,782 | $684,782 | $2,064,070 | $1,712,675 | |
Evidence and data. Interviewees noted that SimSpace fees were based upon its various use cases. Among the interviewees’ organizations, fees ranged broadly based on concurrent users and virtual machines (VMs). Contracts could also be single year or multiple years. Contact the vendor for more specifics.
Modeling and assumptions. For the composite organization, Forrester assumes a single year contract fee of $500,000. This includes the following parameters and services:
Risks. Subscription fees will vary due to use cases and deal sizes.
Results. To account for these risks, Forrester adjusted this cost upward by 5%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $1.3 million.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| F1 | Subscription fee | Vendor | $500,000 | $500,000 | $500,000 | ||
| Ft | Annual subscription fees | F1 | $500,000 | $500,000 | $500,000 | ||
| Risk adjustment | ↑5% | ||||||
| Ftr | Annual subscription fees (risk-adjusted) | $0 | $525,000 | $525,000 | $525,000 | ||
| Three-year total: $1,575,000 | Three-year present value: $1,305,597 | ||||||
Evidence and data. Interviewees’ organizations allocated anywhere from less than one resource to two full-time resources for managing the cyber range and preparing for events. Their responsibilities included:
Modeling and assumptions. For the composite organization, Forrester assumes the following:
Risks. The cost of maintenance of cyber range and planning for events will vary due to:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $161,000.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| G1 | Number of cybersecurity analysts | Interviews | 2 | 2 | 2 | 2 | |
| G2 | Fully burdened annual salary for a cyber security analyst | TEI standard | $110,511 | $110,511 | $110,511 | $110,511 | |
| G3 | Percentage of time spent on maintenance and planning activities | Interviews | 4% | 25% | 25% | 25% | |
| Gt | Maintenance of cyber range and planning for events | G1*G2*G3 | $8,841 | $55,256 | $55,256 | $55,256 | |
| Risk adjustment | ↑10% | ||||||
| Gtr | Maintenance of cyber range and planning for events (risk-adjusted) | $9,724 | $60,782 | $60,782 | $60,782 | ||
| Three-year total: $192,070 | Three-year present value: $160,880 | ||||||
Evidence and data. While most interviewees noted travel for cyber drill events was not required for their staff, two interviewees said their organizations found value in bringing staff together for each full-scale event. These benefits included better communication; improved team coordination among red, blue, and purple teams; and stronger team dynamics.
Modeling and assumptions. Based on the interviews, Forrester assumes the following about the composite organization:
Risks. The annual travel costs for cyber drill events will vary due to:
Results. To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $246,000.
| Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 | |
|---|---|---|---|---|---|---|---|
| H1 | Number of FTEs involved in cyber drill | Interviews | 150 | 150 | 150 | ||
| H2 | Percentage of FTEs who travel to event location | Interviews | 15% | 15% | 15% | ||
| H3 | Average cost of FTE travel | Assumption | $2,000 | $2,000 | $2,000 | ||
| H4 | Number of events per year | Composite | 2 | 2 | 2 | ||
| Ht | Annual travel costs for cyber drill events | H1*H2*H3*H4 | $0 | $90,000 | $90,000 | $90,000 | |
| Risk adjustment | ↑10% | ||||||
| Htr | Annual travel costs for cyber drill events (risk-adjusted) | $0 | $99,000 | $99,000 | $99,000 | ||
| Three-year total: $297,000 | Three-year present value: $246,198 | ||||||
The financial results calculated in the Benefits and Costs sections can be used to determine the ROI, NPV, and payback period for the composite organization’s investment. Forrester assumes a yearly discount rate of 10% for this analysis.
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
| Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
|---|---|---|---|---|---|---|
| Total costs | ($9,724) | ($684,782) | ($684,782) | ($684,782) | ($2,064,070) | ($1,712,675) |
| Total benefits | $0 | $1,420,801 | $1,574,881 | $1,728,961 | $4,724,643 | $3,892,186 |
| Net benefits | ($9,724) | $736,019 | $890,099 | $1,044,179 | $2,660,573 | $2,179,511 |
| ROI | 127% | |||||
| Payback | <6 months | |||||
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
Benefits represent the value the solution delivers to the business. The TEI methodology places equal weight on the measure of benefits and costs, allowing for a full examination of the solution’s effect on the entire organization.
Costs comprise all expenses necessary to deliver the proposed value, or benefits, of the solution. The methodology captures implementation and ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. The ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
Related Forrester Research
The Forrester Wave™: Cybersecurity Skills And Training Platforms, Q4 2023, Forrester Research, Inc., December 12, 2023.
Online Resources
More information about cyber ranges is available from NIST NICE Community Coordinating Council, The Cyber Range: A Guide
1 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists solution providers in communicating their value proposition to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of business and technology initiatives to both senior management and other key stakeholders.
2 Source: Forrester’s Security Survey, 2024. Base: 84 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
3 Source: Forrester’s Security Survey, 2024. Base: 420 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
4 Source: Forrester’s Security Survey, 2024. Base: 424 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
5 Source: Forrester’s Security Survey, 2024. Base: 420 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
6 Source: Forrester’s Security Survey, 2024. Base: 221 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
7 Source: Forrester’s Security Survey, 2024. Base: 424 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
8 Source: Forrester’s Security Survey, 2024. Base: 420 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
9 Source: Forrester’s Security Survey, 2024. Base: 221 security decision-makers with network, data center, app security, or security ops responsibilities at financial services companies with $1B+ in annual revenue. Forrester annually assesses cybersecurity metrics through interviews, surveys, and expertise in the field. Analyses are provided with information rooted with specific data sets most accurately applied to the situations that have been collected in the study.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.
https://mainstayadvisor.com/go/mainstay/gdpr/policy.html