July 10, 2023 By Sanara Marsh 2 min read

What can your organization achieve with an offensive security platform? According to a new Forrester Consulting study, the IBM Security Randori platform delivered a 303% ROI over 3 years and paid for itself in less than 6 months by helping to mitigate risk exposure, better prioritize risk response decisions and act faster.

About the study

IBM commissioned Forrester to conduct the Total Economic Impact™ (TEI) study by interviewing four clients about the value of their investments in the Randori attack surface management (ASM) and continuous automated red teaming (CART) solutions. The interviewed security leaders shared that by deploying the Randori platform, their organizations were able to detect shadow IT assets, rapidly respond to vulnerabilities like Log4j and redirect time previously spent triaging exposures to more proactive security exercises.

The June 2023 study noted: “Compared to their prior environments, interviewees reported between 50% and approximately 95% reductions in manual effort with Randori’s continuous security monitoring.”

Based on the in-depth client interviews, Forrester constructed a single composite organization that aggregated the representatives’ experiences with using the Randori platform. The composite matured its security to an ASM-focused posture in the first year with IBM Security Randori Recon and augmented its red team capabilities with IBM Security Randori Attack in the second and third years. Many quantifiable benefits were identified, including the following:

  • 90% fewer hours of vulnerability scanning per year
  • 75% labor savings from augmented red team activities
  • 30% reduction in time to triage exposures for remediation
  • 20% decrease in cyber insurance premiums

Learn more

Delve more into the details by downloading The Total Economic Impact Of IBM Security Randori study.

Was this article helpful?

More from Cybersecurity

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

Data privacy examples

9 min read - An online retailer always gets users' explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. A school asks parents to verify their identities before giving out student information. These are just some examples of how organizations support data privacy, the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate…

How to prevent prompt injection attacks

8 min read - Large language models (LLMs) may be the biggest technological breakthrough of the decade. They are also vulnerable to prompt injections, a significant security flaw with no apparent fix. As generative AI applications become increasingly ingrained in enterprise IT environments, organizations must find ways to combat this pernicious cyberattack. While researchers have not yet found a way to completely prevent prompt injections, there are ways of mitigating the risk.  What are prompt injection attacks, and why are they a problem? Prompt…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters