{"id":165,"date":"2022-11-17T23:22:00","date_gmt":"2022-11-17T23:22:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=165"},"modified":"2024-08-02T14:08:56","modified_gmt":"2024-08-02T21:08:56","slug":"study-easm-boost-security-reducing-costs","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/","title":{"rendered":"Study: EASM Products Boost Security While Reducing Costs"},"content":{"rendered":"\n<p><em>What is the economic impact of&nbsp;<a href=\"\/external-attack-surface-management\/\">adding an External Attack Surface Management platform<\/a>&nbsp;to your 2024 cybersecurity roadmap?<\/em><\/p>\n\n\n\n<p>Because data breach crystal balls do not exist, calculating a cybersecurity budget can test the mettle of even the most breach hardened CISO. As large economic trends tug more heavily on business priorities, CISOs are increasingly being forced to strike a balance between OpEx versus OpSec spending.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Total Economic Impact Of The CyCognito Platform<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Now a recently released study, commissioned by CyCognito and conducted by Forrester Consulting, gives security team leaders actionable budgeting guidance for projecting a three-year total economic impact an External Attack Surface Management (EASM) platform would have on a large enterprise.\u00a0<\/p>\n\n\n\n<p>The study, The Total Economic Impact Of The CyCognito Platform\u2122, illustrates how an EASM platform can address nagging cybersecurity issues such as long risk remediation times, shadow IT, scarce security expertise and the growing challenge firms face getting their arms around their\u00a0<a href=\"\/learn\/attack-surface-management.php\">entire attack surface and protecting it<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Study Based on Real-World Scenarios<\/h2>\n\n\n\n<p>The 27-page study is chock full of data insights based on dozens of real-world scenarios among four existing CyCognito customers interviewed by Forrester. Forrester created a representative example customer based on the data from all four that it calls a \u201ccomposite\u201d organization.&nbsp;<\/p>\n\n\n\n<p>For example, the Forrester study commissioned by CyCognito, found a representative business can achieve a 490% return on their EASM solution investment (ROI) within three years with the CyCognito platform. Once deployed, CyCognito\u2019s EASM platform can help security teams achieve meaningful reductions in time spent managing IT assets and related labor costs.&nbsp;<\/p>\n\n\n\n<p>Specific reductions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>60% in time spent by security teams on asset discovery.<\/li>\n\n\n\n<li>70% in labor costs tied to asset contextualization, meaning who owns the asset and its business purpose.<\/li>\n\n\n\n<li>15% in time spent remediating cybersecurity incidents.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The CyCognito Difference<\/h2>\n\n\n\n<p>Why and how EASM platforms help businesses reduce time, labor and security operations spending through automated asset discovery and identifying security risks is no secret. Less obvious is how CyCognito can achieve the results outlined in The Total Economic Impact Of The CyCognito Platform\u2122 study by Forrester Consulting.<\/p>\n\n\n\n<p>CyCognito achieves results by going beyond a typical EASM product. CyCognito distinguishes itself by fusing asset discovery, contextualization, testing, prioritization and remediation acceleration into a single product offering that can be managed via one highly intuitive dashboard.<\/p>\n\n\n\n<p>By integrating typically siloed EASM functions together within a single framework, the parts are greater than the whole.<\/p>\n\n\n\n<p>For the study, Forrester based its analysis on comparing the CyCognito platform to enterprise organizations that didn\u2019t have an EASM solution but relied upon enormous amounts of manual efforts in the discovery, contextualization, security testing and remediation of their externally-exposed assets.<\/p>\n\n\n\n<p>The purpose of this study is to arm business decision makers with economic intelligence to accurately evaluate the positive financial impact of the CyCognito platform on their organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Forrester\u2019s Analysis of Benefits<\/h2>\n\n\n\n<p>Benefits of the CyCognito platform include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Savings On Mergers, Acquisitions, And Divestiture<\/li>\n\n\n\n<li>Better Protection Against Security Exploits<\/li>\n\n\n\n<li>Licensing Cost<\/li>\n\n\n\n<li>Deployment Costs<\/li>\n\n\n\n<li>Labor Savings On Handling False Positives<\/li>\n<\/ul>\n\n\n\n<p>To learn more about how the CyCognito platform impacts labor savings within security teams, delivers faster remediation of risks and reduces costs related to cybersecurity insurance, we invite you to read&nbsp;<a href=\"\/resources\/reports\/forrester-the-total-economic-impact-of-the-cycognito-platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">Forrester\u2019s study The Total Economic Impact Of The CyCognito Platform\u2122<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the economic impact of adding an External Attack Surface Management platform to your 2024 cybersecurity roadmap?<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[6,9],"class_list":["post-165","post","type-post","status-publish","format-standard","hentry","category-research","tag-attack-surface-management","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Study: EASM Products Boost Security While Reducing Costs | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Study: EASM Products Boost Security While Reducing Costs | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"What is the economic impact of adding an External Attack Surface Management platform to your 2024 cybersecurity roadmap?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T23:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T21:08:56+00:00\" \/>\n<meta name=\"author\" content=\"Tom Spring\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Spring\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\"},\"author\":{\"name\":\"Tom Spring\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26313d36a7083dad5093098f579e063c\"},\"headline\":\"Study: EASM Products Boost Security While Reducing Costs\",\"datePublished\":\"2022-11-17T23:22:00+00:00\",\"dateModified\":\"2024-08-02T21:08:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\"},\"wordCount\":556,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Attack Surface Management\",\"Cybersecurity\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\",\"name\":\"Study: EASM Products Boost Security While Reducing Costs | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2022-11-17T23:22:00+00:00\",\"dateModified\":\"2024-08-02T21:08:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Study: EASM Products Boost Security While Reducing Costs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26313d36a7083dad5093098f579e063c\",\"name\":\"Tom Spring\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1404e99cecf243146baf40f6c7006aa7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1404e99cecf243146baf40f6c7006aa7?s=96&d=mm&r=g\",\"caption\":\"Tom Spring\"},\"description\":\"Was a Media Manager at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/tom-spring\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Study: EASM Products Boost Security While Reducing Costs | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/","og_locale":"en_US","og_type":"article","og_title":"Study: EASM Products Boost Security While Reducing Costs | CyCognito Blog","og_description":"What is the economic impact of adding an External Attack Surface Management platform to your 2024 cybersecurity roadmap?","og_url":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/","og_site_name":"CyCognito Blog","article_published_time":"2022-11-17T23:22:00+00:00","article_modified_time":"2024-08-02T21:08:56+00:00","author":"Tom Spring","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Spring","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/"},"author":{"name":"Tom Spring","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26313d36a7083dad5093098f579e063c"},"headline":"Study: EASM Products Boost Security While Reducing Costs","datePublished":"2022-11-17T23:22:00+00:00","dateModified":"2024-08-02T21:08:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/"},"wordCount":556,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Attack Surface Management","Cybersecurity"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/","url":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/","name":"Study: EASM Products Boost Security While Reducing Costs | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2022-11-17T23:22:00+00:00","dateModified":"2024-08-02T21:08:56+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/study-easm-boost-security-reducing-costs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Study: EASM Products Boost Security While Reducing Costs"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26313d36a7083dad5093098f579e063c","name":"Tom Spring","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1404e99cecf243146baf40f6c7006aa7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1404e99cecf243146baf40f6c7006aa7?s=96&d=mm&r=g","caption":"Tom Spring"},"description":"Was a Media Manager at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/tom-spring\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=165"}],"version-history":[{"count":8,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/165\/revisions"}],"predecessor-version":[{"id":986,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/165\/revisions\/986"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}