September 2022
Adjust the following assumptions to customize this business case for your specific environment.
To read Forrester's full analysis of Yubico Yubikeys and customize the findings to your organization, please register below.
Security leaders must deploy strong multifactor security solutions to protect their organizations, users, and customers. Forrester interviewed security leaders from five enterprises using YubiKeys and found that YubiKeys slashed exposure to security breaches from phishing and credential thefts by 99.9% while driving business growth through improved reputation and access to high-security contracts. Further, YubiKeys reduced administrative overhead while providing a flexible, dependable user experience.
YubiKeys are hardware-based, phishing-resistant multifactor authentication (MFA) solutions based on open standards that are produced by Yubico. YubiKeys support a vast range of authentication protocols and come in a wide variety of form factors and connectors, such as USB-A, USB-C, Lightning, and NFC, ensuring that they can be used by almost any organization and user on almost any device.
Yubico commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying YubiKeys.1 The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of YubiKeys on their organizations.
To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed five security leaders from organizations that use YubiKeys across their user bases. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization that is a global company based in North America with 5,000 users and revenue of $2.5 billion per year.
Prior to using YubiKeys, interviewees’ organizations — particularly those not yet using any form of MFA — faced excess and unacceptable exposure to security risks. Security teams expended excess effort on setting and managing password policies while users struggled with frustrating, time-consuming password updates and resets. Organizations with legacy MFA solutions also struggled with poor user experiences, outdated code, lock-in to proprietary technology, and expensive, low-quality hardware.
Interviewees’ organizations adopted modern, phishing-resistant MFA security by deploying YubiKeys and simplified password policies across their systems on the ultimate journey to becoming passwordless. YubiKeys virtually eliminated risk of phishing and credential theft, drove business growth due to improved security levels and reputation, and improved productivity and user experience across the organizations.
Quantified benefits. Three-year, risk-adjusted present value (PV) quantified benefits for the composite organization include:
By deploying YubiKeys across its user base, the composite reduces the risk of successful phishing and credential theft attacks by 99.9%.
The improved security reputation from using YubiKeys drives a higher deal conversion rate. Additionally, YubiKeys meet the strict security requirements to bid on new opportunities, resulting in more won deals.
The composite reallocates three FTEs by using YubiKeys to eliminate work related to phishing and credential theft investigation and password management.
Simplifying password policies with YubiKeys reduces help desk tickets by up to 75%.
End users save 30 minutes per avoided password update and 2 hours per password reset. After adjustments, the organization recaptures almost $57 in annual labor per user by Year 3.
Organizations that eliminate legacy MFA solutions can save costs and labor by decommissioning the legacy solutions.
Unquantified benefits. Benefits that are not quantified in this study include:
YubiKeys benefit both direct users and other parties including customers, clients, and partners.
Security leaders see Yubico as a trusted brand with dependable hardware and great support.
Users find YubiKeys easy to use with convenient form factors and connection options, reducing password and hardware frustration.
Services from Yubico and its partners help customers be successful in their MFA journeys.
Costs. Three-year, risk-adjusted PV costs for the composite organization include:
The composite enjoys predictable costs, consistent supplies, replacements, and technical support. YubiEnterprise Subscription begins at 500 users.
The composite distributes YubiKeys to its users globally using Yubico’s turnkey delivery program.
The composite deploys YubiKeys during a one-year period with the work of security engineers, IT staff members, cross-functional leaders, and pilot testers.
After deploying YubiKeys, the composite requires ongoing management for updates, maintenance, support, training, distribution, and more.
End users typically require up two hours of training, setup, and familiarization when getting a YubiKey and learning to use MFA.
Synopsis. The composite organization invests $1.6 million in costs and experiences $4.8 million in benefits over three years, adding up to a net present value (NPV) of $3.2 million and an ROI of 203%.
From the information provided in the interviews, Forrester constructed a Total Economic Impact™ framework for those organizations considering an investment in YubiKeys.
The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision. Forrester took a multistep approach to evaluate the impact that YubiKeys can have on an organization.
Forrester Consulting conducted an online survey of 351 cybersecurity leaders at global enterprises in the US, the UK, Canada, Germany, and Australia. Survey participants included managers, directors, VPs, and C-level executives who are responsible for cybersecurity decision-making, operations, and reporting. Questions provided to the participants sought to evaluate leaders' cybersecurity strategies and any breaches that have occurred within their organizations. Respondents opted into the survey via a third-party research panel, which fielded the survey on behalf of Forrester in November 2020.
Interviewed Yubico stakeholders and Forrester analysts to gather data relative to YubiKeys.
Interviewed five representatives at organizations using YubiKeys to obtain data with respect to costs, benefits, and risks.
Designed a composite organization based on characteristics of the interviewees’ organizations.
Constructed a financial model representative of the interviews using the TEI methodology and risk-adjusted the financial model based on issues and concerns of the interviewees.
Employed four fundamental elements of TEI in modeling the investment impact: benefits, costs, flexibility, and risks. Given the increasing sophistication of ROI analyses related to IT investments, Forrester’s TEI methodology provides a complete picture of the total economic impact of purchase decisions. Please see Appendix A for additional information on the TEI methodology.
Readers should be aware of the following:
This study is commissioned by Yubico and delivered by Forrester Consulting. It is not meant to be used as a competitive analysis.
Forrester makes no assumptions as to the potential ROI that other organizations will receive. Forrester strongly advises that readers use their own estimates within the framework provided in the study to determine the appropriateness of an investment in YubiKeys.
Yubico reviewed and provided feedback to Forrester, but Forrester maintains editorial control over the study and its findings and does not accept changes to the study that contradict Forrester’s findings or obscure the meaning of the study.
Yubico provided the customer names for the interviews but did not participate in the interviews.
Passwords have long protected digital resources and data; however, they are “easy pickings for cybercriminals and the culprit behind many cyberattacks” while “administrative costs and user productivity losses add insult to injury.2 Passwords are no longer adequate to protect organizations, their employees, nor their customers. According to Forrester Research, single-factor passwords are the weakest form of user authentication.3
Passwords are “phishable, crackable, stuffable, and snoopable.”4 Between 2018 and 2020, the number of stolen usernames and passwords available in the dark web increased 300%, with 15 billion stolen logins from 100,000 breaches.”5 Infrastructure and staffing to maintain passwords and investigate incidents can be significant. Password resets are expensive and hurt productivity, costing many enterprises more than $1 million per year in support costs alone.6 Further, passwords are difficult to remember, particularly when regular resets are required. Even despite firm password requirements, more than half of users frequently reuse passwords.7 Users often revise the same base password with only minor changes, such as different numbers at the end.
Forrester advises “to use enterprise MFA and modern passwordless approaches to protect against brute force attacks, phishing, credential stuffing, and other techniques that exploit compromised user credentials.” 8 “MFA thwarts such attempts by requiring two or more factors for identity claims before granting a given user access to your organization’s networks and sensitive corporate data.”9 Enterprise MFA can “eradicate embarrassing password-related security breaches,” “show auditors and regulators you are serious about workforce access control,” and “reduce dependence on cumbersome and expensive password policy management.”10
Many organizations are beginning to require that technology vendors offer MFA. For example, the United States Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) Level 3 requires multifactor authentication for local and network access to privileged accounts and for network access to nonprivileged accounts.11 Similarly, the EU's revised Payment Services Directive (PSD2) mandates MFA for banking transactions.12
Further, Forrester advises organizations try to move away from passwords entirely while deploying MFA.13 Passwordless authentication lowers cost and improves security and business efficiency of adopting firms.14 Despite restrictive technology environments, passwordless MFA adoption is growing.
There are many ways to approach multifactor or two-factor authentication, many of which are passwordless factors such as biometrics, tokens, keys, or open authorization (OAuth)-related solutions. These greatly reduce the attack surface of man-in-the-middle attacks, and vendors of these solutions can help organizations kill the password.15
Any out-of-band second factor (i.e., using a distinct channel) will significantly improve security; however, Forrester recommends to use stronger methods than one-time passwords (OTP) delivered via SMS text messages because they are vulnerable to SIM swapping attacks.16 Although adding SMS two-factor authentication (2FA) is a major improvement over single-factor authentication (SFA), it only stops 76% of narrowly targeted attacks.17
For stronger authentication, organizations have a variety of available solutions.18 Hardware tokens are one of the most secure options available. Because physical presence of the key is required, they are essentially only susceptible to physical theft or malicious insider usage of the key when phishing-resistant protocols are used. Even then, attackers would still have to cross further hurdles from other security solutions to access an account.
Best-in-class hardware tokens can meet the demands of protocols and open standards, thus ensuring wide support across devices and vendors. Further, best-in-class hardware tokens come in many form factors and with many connector options to prevent potential frustration or limitations for users.
Forrester's 2021 Business Technographics Security Survey found that 63% of organizations had at least one security breach in the past 12 months, with 51% having two or more breaches.19 Of those breaches, 44% cost less than $1 million, 42% cost between $1 million and $5 million, and 14% cost more than $5 million.20
Similarly, third parties currently estimate the cost of a typical breach anywhere from $21,659 (Verizon) to $140,000 (CISA) to $4.2 million (IBM), and the frequency of breaches from many times per month to as low as one or two breaches every few years.21
Despite varying data, sources agree on one thing: Security breaches are a major material threat to organizations’ top and bottom lines. Estimating the reduction in security risk exposure is consequently critical when evaluating the business case for a security solution such as Yubico YubiKeys.
In July 2020, Forrester Consulting’s Total Economic Impact practice fielded an independent survey to further evaluate the frequency and severity of breaches for the purposes of improving financial analyses of security solutions regardless of vendor.22 This survey of 342 respondents involved in security at US firms found that the average organization experiences 1.8 material breaches per year that incur labor, costs, and other losses.23 This includes:
This figure includes approximately 837 hours for security operations, 871 hours for IT/network operations, 895 hours for development operations, and 835 hours for external resources (rounded). Assuming an average fully burdened salary of $58 per hour, this equates to $199,346 in labor costs.
This figure includes approximately $104,799 for response and notification, $27,036 for regulatory fines, $54,004 for customer compensation, $45,706 for customer lawsuits and punitive damages, and $38,006 for additive audit and security compliance costs (rounded).
This includes approximately $63,849 in lost revenue due to downtime, $89,895 in lost revenue from customer attrition, $80,436 in cost to rebuild brand equity, and $151,116 in customer churn and additional cost to acquire new customers.
These frequency, labor, and cost estimates form one component of this TEI financial analysis.27 Although actual risk reduction can never be perfectly estimated nor would it be the same for all organizations, this data yields a conservative, reasonable representation of the risk exposure for a typical enterprise.
Role | Industry | Region | YubiKey Users |
---|---|---|---|
Product owner of authentication | Manufacturing | Global, based in Europe | More than 100,000 users |
Director of security engineering | Energy | Global, based in Europe | More than 50,000 users |
General director of information assurancet | Transportation | North America | 15,000 to 50,000 users |
IT product manager | Media and communications | Global, based in North America | 5,000 to 15,000 users |
Senior director of IT | B2B technology | Global, based in North America | 1,000 to 5,000 users |
Before using YubiKeys, interviewees’ organizations used a mix of usernames and passwords, software MFA, and hardware MFA tokens and cards to secure their businesses. These solutions did not fully meet their security needs, particularly due to the following common challenges:
Interviewees’ organizations faced threats including phishing, social engineering, malicious insiders, stolen credentials, weak passwords, and more. The risk of breaches was high, and, in fact, some organizations were hit by successful material breaches in their legacy environments. Security teams saw increasing risks, particularly those that targeted high-profile figures or employees with access to critical, sensitive data. In an internal test, one company found that it could have employee accounts accessed via a password spray attack. Another company experienced a major newsworthy attack forcing phishing-resistant MFA adaptation.
Interviewees mentioned the weaknesses and inefficiencies of passwords. They observed employees sharing, reusing, and creating simple passwords. Interviewees also acknowledged industry reports about the danger of lost and stolen credentials and spoke about the unnecessary time spent on password management, resets, and help desk support.
Some interviewees’ organizations previously used or tested hardware solutions like legacy tokens and smart cards. However, these options often broke and had limited battery life, leading to excessive cost and replacements. They also yielded poor user experiences requiring frequent, frustrating reauthentication and leading to mindless approval of authentications and subsequent security risks. Interviewees also expressed concerns with software MFA options such as SMS codes that can be prone to phishing attacks and SIM swaps.
Employees in dangerous work environments like factory floors may not be able to access phone-based authentication or use a keyboard to type a one-time code or password. Often, these environments also do not have cell reception to receive push/SMS messages. Legacy MFA options could not endure the rigors of the environments which led to breakages, or they could not meet the limitations of the machine interfaces and how workers could interact with them. Air-gapped critical systems were difficult or impossible to protect with other forms of MFA that relied upon some form of network access.
Interviewees noted a need to demonstrate seriousness about security to stakeholders, customers, clients, shareholders, and regulators. Meeting these expectations was a requirement to win and retain business, maintain valuation, and avoid excessive regulatory scrutiny or even fines. One interviewee from the energy company mentioned that customers now consistently ask about MFA and security certifications during their vendor selection process, while another interviewee from the transportation company pointed out the importance of proving satisfactory security to third parties with oversight of their operations.
The interviewees’ organizations sought a phishing-resistant MFA solution based on open standards that could help them achieve the following goals:
Organizations needed to reduce the probability of phishing incidents, social engineering attacks, and insider risk. They hoped to avoid costly investigations, breaches, and losses along with the potential for negative impacts to reputation that might lead to lost sales and market valuation. Conversely, they hoped that strong security would improve their reputations to grow their businesses.
The general director of information assurance for a transportation organization shared: “[We want to show] that we are taking [security] seriously and that we have a robust and ever-improving mature program.”
After some interviewees’ organizations experienced or researched MFA solutions with proprietary standards, they hoped to invest in an option that could meet shared, open security standards like FIDO2. Their investments would allow them the flexibility to use the same solution across different systems for the foreseeable future with the option to evolve with open standards.
The product owner of authentication for a manufacturing company stated: “We've improved usability, flexibility, granularity, and — to some extent — security from our tokens. With those rotating passcodes, there was no alternative use case for it like how the YubiKey can be used as a U2F token, a FIDO token, an HOTP token, or as a smart card if we want. It was really the granularity and flexibility that are offered with the YubiKey [that led to our deployment].”
Decision-makers needed an MFA solution that could work for their organizations’ entire environments to ensure functionality, avoid complexity of multiple devices or solutions, and avoid risk of a failed rollout. The solution needed to support the many technical standards and support the physical demands of the authentication, even for dangerous or high-impact work environments with limited user interfaces or worker equipment.
The product owner of authentication in the manufacturing industry spoke of their organization’s varied systems with different security level needs, while the general director of information assurance in the transportation industry told Forrester about their organization’s thousands of employees distributed extensively and individually across North America. A director of security engineering with an energy company described how their organization needed MFA in both office environments and intense physical environments. They said, “Many times, these servers are in network closets out in the middle of the plant floor, like in an industrial environment.”
To accelerate implementation, interviewees' teams wished to have the option to partake in a vendor’s distribution program or collaborate with knowledgeable and supportive partners. YubiEnterprise Delivery met this goal, simplifying the distribution of YubiKeys to users in both domestic and international locations including residential addresses. The product owner of authentication in the manufacturing industry said their company used a partner for a similar goal. They explained: “[The distributor] took the orders, processed them, worked directly with Yubico, and handled [complications such as] customs, tariffs, or import fees from the various different countries. We used to literally have [an employee] stuff an envelope full of [our previous solution], stick [an address label on an] envelope, and [bring it] down to our internal post office.”
The selected MFA solution needed to be from a vendor decision-makers could trust to limit risk of intrusion through product weaknesses or back doors. Hardware needed to be traceable, have high quality to avoid breakages or failures, and needed to have a consistent and fast supply to avoid disruption to the business.
Security leaders wanted to avoid disrupting end users and provide them value in the process. The MFA solution needed to support a variety of form factors, ports, and systems. Solutions that could be used by employees to secure their personal lives were desirable, effectively turning a security requirement into an employment benefit.
Interviewees’ organizations needed authentication capabilities that met the highest levels of security requirements for government clients and customers in other critical industries. It was important both that their own organizations could demonstrate security of customers’ data in their solutions and that they could bundle YubiKeys with their software and hardware offerings for customers themselves to use when interacting with the system.
After evaluating a variety of authentication options, interviewees’ organizations ultimately selected Yubico’s YubiKeys for the following reasons:
Ability to provide a high level of security via phishing-resistant MFA.
Brand recognition, reputation, trust, and market adoption.
Build quality, durability, and trusted supply chain including production of the hardware in the United States and Sweden.
Positive user experience with easy-to-use form factors and multiple connectors including USB-A, USB-C, Lightning, and NFC that work with major desktop and mobile operating systems.
Flexibility with open standards to support current and future protocols like FIDO2, WebAuthn U2F, PIV, OATH TOTP/HOTP, and OpenPGP, including two custom configurable slots, and enabling passwordless logins.
Professional services from Yubico and its partners for implementation, deployment, and ongoing management, as well as enterprise services such as YubiEnterprise Delivery and YubiEnterprise Subscription programs.
Yubico’s supportiveness and flexibility to assist with customers' unconventional situations, such as systems without connectivity, air-gapped systems, or unique software requirements.
Based on the interviews, Forrester constructed a TEI framework, a composite company, and an ROI analysis that illustrates the areas financially affected. The composite organization is representative of the five interviewees, and it is used to present the aggregate financial analysis in the next section.
The composite organization has the following characteristics:
The composite company has an annual revenue of $2.5 billion with an average operating margin of 13.6%.28
The composite company hopes to eliminate passwords where possible, simplify existing password policies, and reduce policy management. Before implementing YubiKeys, the organization did not use MFA and enforced quarterly password changes with strict password requirements. With these prior policies, the composite company averaged one password reset per user per year.
The composite company utilizes Yubico’s subscription model for purchasing keys, replacements, and professional services and the delivery model for distribution.
The composite organization employs Yubico’s YubiEnterprise Delivery program to manage the distribution of security keys to its global users. Sixty percent of the company's users work at or near a bulk distribution point such as an office, while 40% work remotely. The composite manages the implementation and user training itself with advice and support from Yubico.
The following reference table lists key metrics for the composite organization that are used throughout this financial analysis. In addition to the metrics described elsewhere in this section:
Ref. | Metric | Source | Metric |
---|---|---|---|
R1 | Annual revenue | Your organization | $0 |
R2 | Operating margin | Your organization | 0% |
R3 | Number of users | Your organization | 0 |
R4 | Average fully burdened hourly salary for DevSecOps employees | Your organization | $0 |
R5 | Average fully burdened hourly salary for cross-functional leaders | Your organization | $0 |
R6 | Average fully burdened hourly salary for private industry FTEs | Your organization | $0 |
R7 | Total estimated cost of a significant material breach including costs, labor, and lost revenue | Forrester Consulting data based on industry and organization size | $0 |
R8 | Average incidence of significant material breaches per year | Forrester Consulting data based on industry and organization size | 0 |
R9 | Annualized risk exposure to significant material breaches | R7*R8 | $0 |
Ref. | Benefit | Year 1 | Year 2 | Year 3 | Total | Present Value |
---|---|---|---|---|---|---|
Atr | Strengthened security | $0 | $0 | $0 | $0 | $0 |
Btr | Business growth | $0 | $0 | $0 | $0 | $0 |
Ctr | Security operations efficiency | $0 | $0 | $0 | $0 | $0 |
Dtr | Help desk support savings | $0 | $0 | $0 | $0 | $0 |
Etr | End-user productivity | $0 | $0 | $0 | $0 | $0 |
Ftr | Cost savings from decommissioned authentication solutions | $0 | $0 | $0 | $0 | $0 |
Total benefits (risk-adjusted) | $0 | $0 | $0 | $0 | $0 |
Since deployment of YubiKeys, the interviewees’ organizations have had no breaches or failed penetration tests. Interviewees firmly stated that Yubico’s YubiKeys virtually eliminated the risk of breaches involving phishing or stolen credentials, driving interviewees’ organizations to widely deploy security keys.
For the composite organization, Forrester assumes:
Risk reduction may vary based on:
To account for these risks, Forrester adjusted this benefit downward by 10%, yielding a three-year, risk-adjusted total PV (discounted at 10%) of $2.2 million.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | |
---|---|---|---|---|---|---|
A1 | Annualized risk exposure to significant material breaches | Estimation based on industry | $0 | $0 | $0 | |
A2 | Percent of breaches involving phishing or credential theft paths | Verizon DBIR 2022 | 0% | 0% | 0% | |
A3 | Reduced credentials or phishing attack successes with YubiKeys | Interviews | 0% | 0% | 0% | |
A4 | Reduced risk reduction if a legacy MFA environment is replaced with YubiKeys | Interviews | 0% | 0% | 0% | |
At | Strengthened security | A1*A2*A3*A4 | $0 | $0 | $0 | |
Risk adjustment | ↓10% | |||||
Atr | Strengthened security (risk-adjusted) | $0 | $0 | $0 | ||
Three-year total: $0 | Three-year present value: $0 | |||||
View Less
|
Deploying YubiKeys offered organizations new business opportunities due both to improved security reputations (and avoided losses) and the ability to meet stringent customer security requirements. All five interviewees’ organizations promoted the use of YubiKeys during discussions with clients and customers. Two interviewees actively marketed their use of YubiKeys publicly to drive interested and improve reputation. Interviewees noted how specific deals were won because YubiKeys were supported as an authentication protocol for the buyer. With YubiKeys, several organizations could now bid on (and win) deals by meeting CMMC L3 MFA requirements. YubiKeys met many various high-security requirements, enabling access to new potential buyers and offerings.
For the composite organization, Forrester assumes:
Business growth may vary based on:
To account for these risks, Forrester adjusted this benefit downward by 25%, yielding a three-year, risk-adjusted total PV of $1.2 million.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | ||
---|---|---|---|---|---|---|---|
B1 | Annual revenue | Your organization | $0 | $0 | $0 | ||
B2 | Increased revenue from security reputation and external-user convenience with YubiKeys | Estimate based on interviews | 0% | 0% | 0% | ||
B3 | Attribution of YubiKeys to identified business growth | Assumption | 0% | 0% | 0% | ||
B4 | Operating profit margin | Your organization | 0% | 0% | 0% | ||
B5 | Incremental operating income from improved security reputation | B1*B2*B3*B4 | $0 | $0 | $0 | ||
B6 | Deals identified and won with YubiKeys that required CMMC Level 3 MFA security to bid | Estimate based on interviews | 0 | 0 | 0 | ||
B7 | Average deal size for high-security business opportunities | Your organization | $0 | $0 | $0 | ||
B8 | Reduction in profit margin for competitive high-security contracts | Assumption | 0% | 0% | 0% | ||
B9 | Incremental operating income from winning high-security clients | B4*B6*B7*(1-B8) | $0 | $0 | $0 | ||
Bt | Business growth | B5+B9 | $0 | $0 | $0 | ||
Risk adjustment | ↓25% | ||||||
Btr | Business growth (risk-adjusted) | $0 | $0 | $0 | |||
Three-year total: $0 | Three-year present value: $0 | ||||||
View Less
|
By deploying YubiKeys, organizations gained substantial labor efficiency. DevSecOps employees no longer had to investigate phishing and credential theft attacks due to their reduction or spend as much time on password-related tasks due to the elimination of password policies and related complexity. This allowed security personnel to dedicate time to other tasks. YubiKeys were widely usable out of the box with major open standards and most third-party solutions. For third parties that do not currently support YubiKeys or an associated open standard, Yubico offers integration support for technology partners.
For the composite organization, Forrester assumes:
Efficiency savings may vary based on:
The number of DevSecOps employees and their average salaries.
To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV of $765,000.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | ||
---|---|---|---|---|---|---|---|
C1 | Security personnel reallocated to other value-add tasks by avoiding investigation of phishing or credential theft attacks | Your organization | 0 | 0 | 0 | ||
C2 | Security personnel reallocated to other value-add tasks by simplifying password policies and reducing policy management | Your organization | 0 | 0 | 0 | ||
C3 | Security operations FTEs reallocated to other security tasks | C1+C2 | 0 | 0 | 0 | ||
C4 | Average fully burdened annual salary for DevSecOps employees | Your organization | $0 | $0 | $0 | ||
Ct | Security operations efficiency | C3*C4 | $0 | $0 | $0 | ||
Risk adjustment | ↓15% | ||||||
Ctr | Optimized market expansion (risk-adjusted) | $0 | $0 | $0 | |||
Three-year total: $0 | Three-year present value: $0 | ||||||
View Less
|
Simplifying password policies with YubiKeys enabled interviewees’ organizations to significantly reduce or eliminate password reset and related support tickets. They also reduced device authentication tickets. For example, the IT product manager in the media and communications industry shared: “There usually was a surge in tickets in [whenever phonemakers] release new phones. We’ve actually eliminated that class of tickets completely because we no longer need people to repair their own authenticator when setting up a new device.” Although organizations did gain tickets related to YubiKeys, the net result was a significant overall reduction in tickets that improved over time.
For the composite organization, Forrester assumes:
Support savings may vary based on:
To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV of $51,000.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | ||
---|---|---|---|---|---|---|---|
D1 | Number of users | Your organization | 0 | 0 | 0 | ||
D2 | Typical password resets per user, per year | Assumption | 0 | 0 | 0 | ||
D3 | Typical number of password resets | D1*D2 | 0 | 0 | 0 | ||
D4 | Average cost per ticket | Assumption | $0 | $0 | $0 | ||
D5 | Percent reduction in tickets by replacing password resets with tickets for hardware keys | Estimate based on interview data | 0% | 0% | 0% | ||
Dt | Help desk support savings | D3*D4*D5 | $0 | $0 | $0 | ||
Risk adjustment | ↓5% | ||||||
Dtr | Help desk support savings (risk-adjusted) | $0 | $0 | $0 | |||
Three-year total: $0 | Three-year present value: $0 | ||||||
View Less
|
Interviewees whose organizations eliminated quarterly password resets and simplified password rules said users saved significant time and frustration by no longer having to repeatedly update their passwords, meet stringent password rules, repeatedly memorize new passwords, and occasionally go through password reset processes. Furthermore, they said users also loved the experience and time savings of tapping a YubiKey compared to entering a code from a mobile application or other legacy hardware MFA options.
The product owner of authentication in the manufacturing industry stated: “Users like the simplicity of the key. They like just plugging it in and pushing the button, and most just leave it plugged in all day long. It's a lot simpler and faster than having to read [and input] a code.”
For the composite organization, Forrester assumes:
End-user productivity may vary based on:
To account for these risks, Forrester adjusted this benefit downward by 15%, yielding a three-year, risk-adjusted total PV of $596,000.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | ||
---|---|---|---|---|---|---|---|
E1 | Number of users | Your organization | 0 | 0 | 0 | ||
E2 | Hours saved per user, per password update | Estimate based on interview data | 0.0 | 0.0 | 0.0 | ||
E3 | Total hours saved for quarterly password updates | E1*E2*4 | 0 | 0 | 0 | ||
E4 | Number of avoided password resets per year | D3*D5 | 0 | 0 | 0 | ||
E5 | Hours of end user disruption avoided per password reset | Estimate based on interview data | 0 | 0 | 0 | ||
E6 | Hours saved by end users from prevented password resets | E4*E5 | 0 | 0 | 0 | ||
E7 | Total hours saved by end users | E3+E6 | 0 | 0 | 0 | ||
E8 | Average fully burdened hourly salary for users | Your organization | $0 | $0 | $0 | ||
E9 | Productivity recapture rate | Forrester | 0% | 0% | 0% | ||
Et | End-user productivity | E7*E8*E9 | $0 | $0 | $0 | ||
Risk adjustment | ↓15% | ||||||
Etr | End-user productivity (risk-adjusted) | $0 | $0 | $0 | |||
Three-year total: $0 | Three-year present value: $0 | ||||||
View Less
|
While some organizations will deploy YubiKeys as their first form of multifactor authentication, other organizations may already use other forms of authentication that would be decommissioned when deploying Yubico such as biometrics, software tokens and certs, QR codes, WebAuthn via mobile browser, native mobile device—based apps, or legacy hardware tokens.
The business case will differ for organizations that replace an alternative form of authentication with YubiKeys as compared to an organization adopting multifactor for the first time.
This is because those other forms of multifactor security already would have reduced the risk of a breach, leaving less room for improvement. YubiKeys would still typically strengthen security beyond what most other forms of authentication can offer, particularly when compared to SMS, biometrics, and QR codes which are more vulnerable than other options such as native mobile-based apps or other hardware tokens and keys. However, the modeled reduction in security risk as shown in Table A would not be as significant as modeled for the composite organization that did not have a legacy multifactor solution at all before YubiKeys. Improvement would vary by scenario.
The exact costs saved would depend on the specific legacy solution being decommissioned, and may include:
Some interviewed customers specifically used legacy physical authentication methods before using YubiKeys. These interviewees said that before making the transition, the downsides to these legacy tokens and cards included physical damage, drained batteries, mindless authentication, and poor user experiences. Although moving to YubiKeys from a legacy MFA solution may not have yielded as great of a risk reduction as compared to a company not yet using MFA, the benefits were still evident to the interviewees.
For the composite organization, Forrester assumes that the composite organization does not have a legacy MFA solution and therefore there are no cost savings modeled.
For organizations that do decommission legacy MFA solutions, cost savings calculations should consider the risk that there may be a lag between deployment of YubiKeys until full adoption of YubiKeys and actual decommissioning of the legacy solution. Contract length and preferences for redundancy may affect this timeline. There also may be some risks associated with change management, migration, and integration; however, these are effectively accounted for in this TEI model because this risk would also apply for an organization deploying MFA for the first time (and likely be a greater challenge).
The composite organization does not eliminate a legacy solution and therefore the three-year, risk-adjusted PV for this benefit is $0.
Ref. | Metric | Source | Year 1 | Year 2 | Year 3 | ||
---|---|---|---|---|---|---|---|
F1 | Annual cost of legacy MFA solution | Your organization | $0 | $0 | $0 | ||
F2 | Cost savings | Assumption | 0% | 0% | 0% | ||
Ft | Cost savings from decommissioned authentication solutions | F1*F2 | $0 | $0 | $0 | ||
Risk adjustment | ↓5% | ||||||
Ftr | Cost savings from decommissioned authentication solutions (risk-adjusted) | $0 | $0 | $0 | |||
Three-year total: $0 | Three-year present value: $0 | ||||||
View Less
|
Additional benefits that customers experienced but were not able to quantify include:
Interviewees highlighted how their organizations’ clients, customers, and partners benefited from their improved security in addition to their direct users and employees.
Interviewees found solace not only in Yubico's hardware, but also in their supply chain and support. Yubico manufactures its security keys in the United States and Sweden, and interviewees’ organizations never experienced supply issues. This was critical when committing to a new solution. Furthermore, interviewees spoke highly of Yubico's flexibility and assistance with their organizations’ unique use cases.
The IT product manager for a media and communications company emphasized the trust they placed in Yubico and its supply chain: “The other value for me was brand trust. I started working with Yubico, and we were writing out on a napkin how this could work. Once I realized I could really trust this company and that [Yubico is] really just top of its class, that’s when I went to [my leadership] and said that YubiKeys could probably help us with our supply chain security.”
Interviewees shared stories of improved user experiences with less password and hardware frustration. They said they and end users valued the diverse form factor and connection options, which helped protect devices and accounts both in the office and at home. Further, users were encouraged to use YubiKeys to protect their personal accounts as an added employee benefit. This helped prevent frustrating, time-consuming, and potentially costly breaches in their personal lives.
The product owner of authentication for a manufacturing company said: “The users like just plugging [their YubiKey] in and [touching the sensor]. They don’t even take it out of their USB port. For them, it’s a lot simpler [and] faster than [legacy options].” Similarly, the B2B technology company’s senior director of IT shared, “[Once users] know how to use [YubiKeys], it’s faster [than other MFA methods] because all they have to do is tap it.”
Interviewees’ organizations advocated for the value and capabilities of the partners that helped them deploy and manage their YubiKeys. The transportation company’s general director of information assurance received valuable support from Yubico and one of its partners, remarking: “Yubico will let you implement however you want. They’re not going to restrict you. They’re not going to mandate for you. I look to Yubico and [our partner] as a huge part [of our success]. We wouldn’t be successful without Yubico.”
The value of flexibility is unique to each customer. There are multiple scenarios in which a customer might implement YubiKeys and later realize additional uses and business opportunities, including:
Interviewees spoke of novel uses for YubiKeys like requiring a valid security key authentication to approve payments, submit code commits, and grant data access.
The senior director of IT for a B2B technology company discussed how their organization creatively used YubiKeys to sign code commits and create a chain of proof. They said: “By using [a data encryption program with] the security key, we are actually signing commits to code [with YubiKeys] which helps us to ensure the security of the software supply chain from computer to deployment.”
Choosing an MFA solution based on open standards enabled interviewees’ organizations to adopt current standards and adapt to new, modern standards like FIDO2. Already-deployed YubiKeys could be used for new authentication protocols without disruptive redistribution and could support multiple functions simultaneously during a phased rollout. Additionally, interviewees valued the interoperability and portability to authenticate in virtually any environment from any vendor without the lock-in that comes from using an open standards-based solution. YubiKeys could even be used in novel ways, such as securing an air-gapped system.
The general director of information assurance for a transportation company discussed the flexibility of YubiKeys’ open standards, saying: “YubiKeys save us from buying an additional token [for different environments] and managing that additional token separately. Further, FIDO is still our end goal, and it’s still the direction that cybersecurity world seems to be going. When we get there, we can leverage the YubiKeys that are already in our customers’ and employees' hands to make that change with no additional cost or logistics. We already did the work, and we will get to reap the benefits.”
Yubico customers can purchase keys individually or in bulk as perpetual purchases or use the YubiEnterprise Subscription. The subscription model provides budget predictability and control, shifting from capital expenditure-based (capex) to operating expenditure-based (opex) to lighten the blow to initial budgets and adding agility for evolving business needs. The subscription model also includes key replacements, which could simplify processes during employee turnover with just-in-time inventory and management. Evaluating which model will be better for an organization will depend on the organization’s priorities, the size of its user base, the unique behaviors and needs of users, and the length of time included in the financial analysis to compare costs.
With multiprotocol support, YubiKeys offer a bridge to passwordless authentication, enabling a smooth transition to a passwordless future. YubiKeys were a critical part of interviewees' plans to move beyond passwords and improve their security.
The IT product manager of a media and communications organization said: “[YubiKeys] have helped us prepare to move away from a traditional VPN toward externally accessible applications. We are a lot more likely to adopt a security scope similar to Zero Trust with a key-based U2F (universal 2nd factor). It is a lot more interesting and compelling because YubiKeys are there as one of the bedrock pieces.”
YubiKeys come in many form factors with connectors that ensure they work across various devices and operating systems, including mobile and desktop, giving interviewees’ organizations the flexibility to adapt to the needs of their users.
Using YubiEnterprise Delivery, interviewees’ organizations could more easily monitor inventory and demand for YubiKeys, which helped to better predict, control, and plan for their users’ needs. Using YubiEnterprise Subscription, they could also potentially minimize the need for bulk purchases to avoid the risk of purchasing excess inventory versus demand, purchasing the wrong form factors for their users, or needing to store and track large amounts of on-site inventory.
Flexibility would also be quantified when evaluated as part of a specific project (described in more detail in Appendix A).
Ref. | Cost | Initial | Year 1 | Year 2 | Year 3 | Total | Present Value |
---|---|---|---|---|---|---|---|
Gtr | YubiEnterprise Subscription | $0 | $0 | $0 | $0 | $0 | $0 |
Htr | Yubico Enterprise Delivery | $0 | $0 | $0 | $0 | $0 | $0 |
Itr | Deployment | $0 | $0 | $0 | $0 | $0 | $0 |
Jtr | Ongoing management | $0 | $0 | $0 | $0 | $0 | $0 |
Ktr | End user training | $0 | $0 | $0 | $0 | $0 | $0 |
Total costs (risk-adjusted) | $0 | $0 | $0 | $0 | $0 | $0 |
Interviewees’ organizations purchased YubiKeys via both perpetual and subscription models. The capex perpetual model includes one-time purchases of YubiKeys with lifetime use. When keys are lost or new employees are hired, new keys must be purchased. In contrast, the opex subscription model incurs recurring charges per user per year with included key replacements, even as users leaving the company take their keys with them. The YubiEnterprise Subscription program can provide predictable annual costs, reliable supplies with buffer, replacements, flexibility, and technical support from Yubico.
Forrester modeled the cost for the composite organization assuming:
YubiEnterprise Subscription fees may vary based on the number of users and the desired models of YubiKeys to meet user needs.
To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV of $361,000.
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
Gt | YubiEnterprise Subscription | Estimation | $0 | $0 | $0 | $0 |
Risk adjustment | ↑10% | |||||
Gtr | YubiEnterprise Subscription (risk-adjusted) | $0 | $0 | $0 | $0 | |
Three-year total: $0 | Three-year present value: $0 | |||||
View Less
|
Security key distribution has grown more complex in recent years as remote work has increased. To deliver YubiKeys to their employees whether at home or at work, most interviewees’ organizations participated in Yubico's YubiEnterprise Delivery program, taking advantage of efficient outsourced distribution and a cloud-based ordering and APIs.
Aside from minimum purchase requirements, the only associated cost was shipping. Shipping costs would be incurred regardless of whether an organization uses this service or does it themselves, though costs may vary. Interviewees reported saving significant labor effort and frustration by using this service.
The senior director of IT of a B2B technology company told Forrester: “We've fully automated the process that programmatically ships [new hires] their laptop and interacts with Yubico through their APIs to ship them security keys. [YubiEnterprise Delivery] will ship the keys to users and provide tracking information.”
Forrester modeled the cost for the composite organization assuming:
Distribution costs may vary based on:
To account for these risks, Forrester adjusted this cost upward by 15%, yielding a three-year, risk-adjusted total PV of $52,000.
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
H1 | Number of users | Your organization | 0 | 0 | 0 | 0 |
H2 | Percent of total users receiving a new key in the calendar year | Interview data | 0% | 0% | 0% | 0% |
H3 | Percent of keys shipped directly to users rather than distributed in bulk | Assumption | 0% | 0% | 0% | 0% |
H4 | Average global shipping cost per key sent directly to users | Interview data | $0 | $0 | $0 | $0 |
Ht | Yubico Enterprise Delivery | H1*H2*H3*H4 | $0 | $0 | $0 | $0 |
Risk adjustment | ↑15% | |||||
Htr | Yubico Enterprise Delivery (risk-adjusted) | $0 | $0 | $0 | $0 | |
Three-year total: $0 | Three-year present value: $0 | |||||
View Less
|
After selecting Yubico YubiKeys, interviewees’ organizations took steps to build, test, deploy, and evangelize the new solution. The keys themselves supported many standards and required minimal labor. However, in many cases, organizations needed to update or deploy solutions to enable MFA for systems that did not use MFA in the past or used outdated standards.
Forrester modeled the cost for the composite organization assuming:
The deployment costs may vary based on:
To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV of $494,000.
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
I1 | Internal labor hours for security, IT, and network engineers | Interview data | 0 | 0 | 0 | 0 |
I2 | Average fully burdened hourly salary for DevSecOps employees | Your organization | $0 | $0 | $0 | $0 |
I3 | IT labor cost | I1*I2 | $0 | $0 | $0 | $0 |
I4 | Internal labor hours for cross-functional leadership and change management | Interview data | 0 | 0 | 0 | 0 |
I5 | Average fully burdened hourly salary for crossfunctional leaders | Your organization | $0 | $0 | $0 | $0 |
I6 | Crossfunctional labor cost | I4*I5 | $0 | $0 | $0 | $0 |
I7 | Internal labor hours for pilot users | Interview data | 0 | 0 | 0 | 0 |
I8 | Average fully burdened hourly salary for users | Your organization | $0 | $0 | $0 | $0 |
I9 | Pilot user labor cost | I7*I8 | $0 | $0 | $0 | $0 |
It | Deployment | I3+I6+I9 | $0 | $0 | $0 | $0 |
Risk adjustment | ↑10% | |||||
Itr | Deployment (risk-adjusted) | $0 | $0 | $0 | $0 | |
Three-year total: $0 | Three-year present value: $05 | |||||
View Less
|
Interviewees discussed ongoing management requirements beyond the initial deployment of YubiKeys to their organizations’ users. Ongoing work included technical tasks like patching, updates, and implementations along with management labor for security key distribution and user training.
Forrester modeled the cost for the composite organization assuming:
Management costs may vary based on:
To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV of $165,000.
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
J1 | Security labor hours for updates, maintenance, and support of authentication environment | Interviews | 0 | 0 | 0 | 0 |
J2 | Security labor hours for running trainings and distributing keys | Assumption | 0 | 0 | 0 | 0 |
J3 | Average fully burdened hourly salary for DevSecOps employees | Your organization | $0 | $0 | $0 | $0 |
Jt | Ongoing management | (J1+J2)*J34 | $0 | $0 | $0 | $0 |
Risk adjustment | ↑10% | |||||
Jtr | Ongoing management (risk-adjusted) | $0 | $0 | $0 | $0 | |
Three-year total: $0 | Three-year present value: $0 | |||||
View Less
|
After purchasing and distributing YubiKeys, interviewees and their teams concentrated on user training and setup. Many users had not used any form of MFA in the past, so early education helped leaders and end users understand MFA and learn how to use Yubikeys. Once executives and users got over the hump, they quickly saw the value and came to prefer YubiKeys more than their prior environments. Users typically received up to an hour of formal training on MFA and Yubikeys and spent a small amount of time reading instructional articles and setting up devices and account logins. Total time requirement was typically up to 2 hours per user.
Forrester modeled the cost for the composite organization assuming:
End-user labor costs may vary based on:
To account for these risks, Forrester adjusted this cost upward by 10%, yielding a three-year, risk-adjusted total PV of $522,000.
Ref. | Metric | Source | Initial | Year 1 | Year 2 | Year 3 |
---|---|---|---|---|---|---|
K1 | New key deliveries | H1*H2 | 0 | 0 | 0 | 0 |
K2 | Percent of keys going to first-time YubiKey users | Interview data | 0% | 0% | 0% | 0% |
K3 | Number of trainees | K1*K2 | 0 | 0 | 0 | 0 |
K4 | Hours of training, set-up, and familiarization per first-time user | Interview data | 0.0 | 0.0 | 0.0 | 0.0 |
K5 | Average fully burdened hourly salary for users | Your organization | $0 | $0 | $0 | $0 |
Kt | End-user training and setup | K3*K4*K5 | $0 | $0 | $0 | $0 |
Risk adjustment | ↑10% | |||||
Ktr | End-user training and setup (risk-adjusted) | $0 | $0 | $0 | $0 | |
Three-year total: $0 | Three-year present value: $0 | |||||
View Less
|
These risk-adjusted ROI, NPV, and payback period values are determined by applying risk-adjustment factors to the unadjusted results in each Benefit and Cost section.
Initial | Year 1 | Year 2 | Year 3 | Total | Present Value | |
---|---|---|---|---|---|---|
Total costs | $0 | ($259,101) | ($277,592) | ($321,230) | ($857,923) | ($706,307) |
Total benefits | $0 | $585,735 | $1,032,091 | $1,534,799 | $3,152,625 | $2,538,571 |
Net benefits | $0 | $326,634 | $754,499 | $1,213,569 | $2,294,702 | $1,832,264 |
ROI | 0% | |||||
Payback period (months) | 0 months | |||||
View Less
|
Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
Benefits represent the value delivered to the business by the product. The TEI methodology places equal weight on the measure of benefits and the measure of costs, allowing for a full examination of the effect of the technology on the entire organization.
Costs consider all expenses necessary to deliver the proposed value, or benefits, of the product. The cost category within TEI captures incremental costs over the existing environment for ongoing costs associated with the solution.
Flexibility represents the strategic value that can be obtained for some future additional investment building on top of the initial investment already made. Having the ability to capture that benefit has a PV that can be estimated.
Risks measure the uncertainty of benefit and cost estimates given: 1) the likelihood that estimates will meet original projections and 2) the likelihood that estimates will be tracked over time. TEI risk factors are based on “triangular distribution.”
The initial investment column contains costs incurred at “time 0” or at the beginning of Year 1 that are not discounted. All other cash flows are discounted using the discount rate at the end of the year. PV calculations are calculated for each total cost and benefit estimate. NPV calculations in the summary tables are the sum of the initial investment and the discounted cash flows in each year. Sums and present value calculations of the Total Benefits, Total Costs, and Cash Flow tables may not exactly add up, as some rounding may occur.
1 Total Economic Impact is a methodology developed by Forrester Research that enhances a company’s technology decision-making processes and assists vendors in communicating the value proposition of their products and services to clients. The TEI methodology helps companies demonstrate, justify, and realize the tangible value of IT initiatives to both senior management and other key business stakeholders.
2 Source: “Using Zero Trust To Kill The Employee Password,” Forrester Research, Inc., August 2, 2021.
3 Source: “Now Tech: Enterprise Multifactor Authentication Solutions, Q1 2022,” Forrester Research, Inc., February 3, 2022.
4 Source: “The Top Trends Shaping IAM In 2020,” Forrester Research, Inc., January 29, 2020.
5 Source: “Now Tech: Enterprise Multifactor Authentication Solutions, Q1 2022,” Forrester Research, Inc., February 3, 2022.
6 Source: “Optimize User Experience With Passwordless Authentication,” Forrester Research, Inc., March 2, 2020.
7 Source: “The State Of Customer Authentication, 2022,” Forrester Research, Inc., June 2, 2022.
8 Source: “Now Tech: Enterprise Multifactor Authentication Solutions, Q1 2022,” Forrester Research, Inc., February 3, 2022.
9 Source: Ibid.
10 Source: Ibid.
11 Source: “CMMC Practice IA.L2-3.5.3 – Multifactor Authentication: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.,” Defense Industrial Base Sector Coordinating Council.
12 Source: “The Top Trends Shaping IAM In 2020,” Forrester Research, Inc., January 29, 2020.
13 Source: Sean Ryan, “Two-Factor Authentication (2FA) Or Multifactor Authentication (MFA)? That Is The Question,” Forrester Blogs.
14 Source: “Optimize User Experience With Passwordless Authentication,” Forrester Research, Inc., March 2, 2020.
15 Source: “A Practical Guide To A Zero Trust Implementation,” Forrester Research, Inc., August 2, 2021.
16 Source: Sean Ryan, “Two-Factor Authentication (2FA) Or Multifactor Authentication (MFA)? That Is The Question,” Forrester Blogs.
17 Source: “Remote Workers Turning To SMS-Based Two-Factor Authentication Is Much Better Than Passwords, But It Won’t Stop Targeted Attacks,” Forrester Research, Inc., September 22, 2020.
18 Source: “The Current State Of Enterprise Passwordless Adoption,” Forrester Research, January 19, 2022.
19 Source: “Forrester Analytics Business Technographics Security Survey, 2021,” Forrester Research, Inc., September 2021.
20 Source: Ibid.
21 Source: “2021 Data Breach Investigation Report,” Verizon, May 2021; “Cost of a Cyber Incident: Systematic Review and Cross-Validation,” Cybersecurity & Infrastructure Agency, October 26, 2021; “How much does a data breach cost in 2022?,” IBM, 2021. The high degree of variance in this data across sources is expected. The likelihood and cost of a given breach varies based on many factors. Many breaches are never reported and those that are reported often only have limited data. Estimates must usually rely upon self-reporting, which may not be an accurate representation of real costs. Investigation and measurement methodology significantly affects analysis.
22 Source: Forrester Consulting Cost Of A Cybersecurity Breach Survey, Q1 2021.
23 Source: Ibid.
24 Source: Ibid.
25 Source: Ibid.
26 Source: Ibid.
27 The Forrester TEI survey data is the primary source of risk exposure in this study’s financial analysis because: 1) It is one of the only available sources that samples all organizations regardless of whether they have had a breach rather than biasing to only measure breaches; 2) It therefore can measure the frequency of breaches per organization; 3) It also pairs this breach frequency with an average cost estimate per breach (most sources do only one or the other); 4) It further breaks down cost beyond a single number into specific categories (most available sources do not do so), exposing more insight and increasing confidence in the data; and 5) Its’ breach frequency and cost estimates both fall conservatively within the range of estimates from other notable third-party sources.
28 Source: “Margins by Sector (US),” NYU Stern School of Business, January 2022.
29 Source: “Employer Costs For Employee Compensation — March 2022,” Bureau of Labor Statistics, June 16, 2022
30 Source: “2022 Data Breach Investigation Report,” Verizon, June 2022.
Cookie Preferences
Accept Cookies
A cookie is a small text file that a website saves on your computer or mobile device when you visit the site. It enables the website to remember your actions (data inputs, website navigation), so you don’t have to re-enter data when you come back to the site or browse from one page to another.
Behavioral information collected by our web analytics vendor is used to analyze data pertaining to visitor trends, plan website enhancements, and measure overall website effectiveness. We may also use cookies or web beacons to help us offer you products, programs, or services that may be of interest to you and to deliver relevant advertising. We may use third-party advertising companies to help tailor website content to users or to serve ads on our behalf. These companies may also employ cookies and web beacons to measure advertising effectiveness.
Please accept cookies and the collection of behavioral information to receive full functionality and enhance your experience. If you decline cookies, some features of the website may not function normally.
Please see our
Privacy Policy for more information.