Powered by
New / Open
Save As
Create Report
Log Out
Settings
About
Company name

Indicate the company's name here. This will be included on the customized report output.

Your industry

The industry the organization operates in represents the main industry classification for the company. This, along with the primary location of the organization help scale key metrics in the tool, particular relating to salary and revenue per employee figures.

Your location

The primary geographic location where the organization operates.

Annual revenue (in millions)

The average annual revenue or equivalent for the organization, entered in millions.

Cybersecurity engineers

In plant security engineers and security operations center (SOC).

Asset management and inventory

Indicate the FTEs associated with asset management and inventory functions.

Compliance and risk management

Indicate the FTEs associated with compliance, risk, and audits.

Total number of site visits performed / scheduled for inspections and audits per year

Indicate the number of site visits performed / scheduled for inspections and audits per year.

Include SOC integration

If SOC integration is included, there will be added opportunities to manage assets and optimize network architecture.

Number of security events over the last 12 months

The estimated annual number of security events over the last 12 months.

Average time to investigate an incident (hours)

The estimated annual number of hours it takes to investigate an actionable security event.

Annual downtime hours (planned and unplanned)

The estimated number of downtime hours per event.

Reportable security incidents (internal and external) per year

Incidents that have compromised or disrupted one or more reliability tasks (i.e., core activities of a responsible entity).

Average fully loaded salary

Includes base salary, commission and incentive pay, bonuses, health and fringe benefits, and overhead costs.

Do you require firewall integration?

Disclaimer: Refer to pre-sales to understand the supported brands the extent of the integration.

Do you require SIEM integration?

Disclaimer: Refer to pre-sales to understand the supported brands the extent of the integration.

Do you require asset management integration?

Disclaimer: Refer to pre-sales to understand the supported brands the extent of the integration.

Average time to investigate and resolve a security event (hours)

Reduce the time and effort understanding threats and prioritizing patches and prevention. Also lower mean time to detect and resolve realized threats.

Annual downtime hours (planned and unplanned)

Downtime caused by cybersecurity issues such as malfunctioning of malware and viruses.

Percent of outage impact that will not be recovered

Downtime that cannot be recovered and has a direct effect on lost sales, productivity or brand image.

Annual downtime hours (planned and unplanned)

Caused by the malfunctioning of machines.

Percentage of outage impact that will not be recovered

Downtime that cannot be recovered and has a direct effect on lost sales, productivity or brand image.

COMPANY PROFILE
Tell us about your company to get the ROI analysis started
Company name
Your industry
Other industry
Your location
State
Currency
Annual revenue (in millions)
Your role(s) (select all that apply)
Operation Technology (OT):
Information Technology (IT):
DISCOVERY
Number of full time equivalents (FTEs) focused on industrial control system (ICS) cybersecurity and compliance
Cybersecurity engineers
Asset management and inventory
Compliance and risk management
Total number of site visits for inspections and audits per year
Do you have an existing SOC?
Number of ICS cybersecurity events in last 12 months
Average time to investigate a security event (hours)
Annual downtime hours associated with security events (planned and unplanned)
Reportable security events (internal and external) per year
CHALLENGES
Tell us about your ICS cybersecurity challenges and compare your selections to your peers. These selections will be used to focus the value analysis on your top priority challenges.
POTENTIAL ANNUAL VALUE FROM SILENTDEFENSE
Based on your profile and top / high priority challenges, this is the annual savings and risk avoidance which SilentDefense is projected to provide to you.

Total annual savings potential
Annual Savings by Opportunity
EXPECTED COST SAVINGS AND RISK AVOIDANCE FROM SILENTDEFENSE
Year 1
Year 2
Year 3
Total
Year 1
Year 2
Year 3
Total
Year 1
Year 2
Year 3
Total
Year 1
Year 2
Year 3
Total
Year 1
Year 2
Year 3
Total
Year 1
Year 2
Year 3
Total
Potential benefits
Year 1
Year 2
Year 3
Total
Realized benefits
Year 1
Year 2
Year 3
Expected total benefits
Year 1
Year 2
Year 3
Total

Expected average annual savings

Expected savings over three years
Three Year Realized Benefits
ROI ANALYSIS
The projected return on investment from the proposed SilentDefense solution.
Year 1
Year 2
Year 3
Cumulative expected benefits
Year 1
Year 2
Year 3
Year 1
Year 2
Year 3
Cumulative investment
Year 1
Year 2
Year 3
Net benefits
Year 1
Year 2
Year 3
Cumulative net benefits
Year 1
Year 2
Year 3

ROI

Payback period

NPV savings
Cumulative Investment vs. Cumulative Benefit

SUCCESS COULD BE YOURS, TOO

See how others just like you have achieved their goals with SilentDefense.
NEXT STEPS

Looking for additional information?

Learn more about how our solutions will benefit your organization
Cybersecurity FTEs
Current
Savings with SilentDefense
With SilentDefense
Fully loaded salary
Current
Savings with SilentDefense
With SilentDefense
Total annual cost for cybersecurity FTEs
Current
Benefit
Proposed
Asset management and inventory FTEs
Current
Savings with SilentDefense
With SilentDefense
Fully loaded salary
Current
Savings with SilentDefense
With SilentDefense
Total annual cost for asset management and inventory FTEs
Current
Savings with SilentDefense
With SilentDefense
Total annual FTE cost
Current
Savings with SilentDefense
With SilentDefense
Number of site visits for inspections and audits per year
Current
Savings with SilentDefense
With SilentDefense
Average cost per site visit
Current
With SilentDefense
Total annual site visit cost
Current
Savings with SilentDefense
With SilentDefense
Total annual opportunity with SilentDefense
Current
Savings with SilentDefense
With SilentDefense

Productivity gained (equivalent FTEs)

Annual savings potential

Three year potential savings (with growth)
TCO Comparison
Most organizations don’t have visibility into the assets on their ICS network, which is one of the primary impediments to securing these systems.
Without full knowledge of ICS assets, vulnerabilities, additions and changes, defenders are effectively working blindly, unable to make adequately informed decisions regarding which controls to implement to mitigate risks and how to prioritize security plans and spending.

DID YOU KNOW ...

4 out of 10

ICS security practitioners lack visibility or sufficient supporting intelligence into their ICS networks (SANS Institute)

33%

of organizations have not performed security assessments of their control systems / networks in a year or more (SANS Institute)

100%

of organizations have IoT technologies connected to their network and on average there are 4.7 technologies on each. (Forrester Consulting on behalf of Fortinet, January 2018)

44%

consider that adding devices to the network is the top ICS threat vector (SANS Institute)

THE BOTTOM LINE

Do you know what you have?
Do you know what threats you should be most worried about?
Do you know your risk?
WHAT IF YOU COULD ...
  • Quickly integrate asset inventory data to existing systems to better identify all assets on the network
  • Assure that any asset changes or additions are captured in real time and added to your asset inventory
  • Quickly, easily, and effectively highlight and prioritize vulnerabilities
  • Integrate this knowledge with your existing tools and knowledgebase

SilentDefense delivers with asset inventory and vulnerability assessment which includes:

Automatic asset and communication inventory, along with a network map for better visualization and context
Passive device fingerprinting, including device model, firmware version, and modules
Matching of the asset inventory data with known vulnerabilities
Integration with asset management tools for full asset control from a single screen

THIS CAN HELP ...

Reduce the cost of manual asset inventory, site visits / audits
Reduce the time it takes to complete a vulnerability assessment
Replace out ill-suited tools and elevate capabilities with a single relationship with one vendor
Reduce security risks
Number of security events over the last 12 months
Current
Savings with SilentDefense
With SilentDefense
Average time to investigate and resolve a security event (hours)
Current
Savings with SilentDefense
With SilentDefense
Hourly cost per IT staff
Current
With SilentDefense
Total cost to investigate a security event
Current
Benefit
Proposed
Annual downtime hours (planned and unplanned)
Current
Savings with SilentDefense
With SilentDefense
Revenue impact
Average revenue per hour for the organization
Current
With SilentDefense
Operating margin
Current
With SilentDefense
Percent of outage impact that will not be recovered
Current
With SilentDefense
Revenue downtime cost per hour
Current
With SilentDefense
Total revenue downtime impact
Current
With SilentDefense
Productivity impact
Successful security events per year
Current
With SilentDefense
Average cost per FTE experiencing downtime
Current
With SilentDefense
Total productivity downtime impact
Current
With SilentDefense
Total downtime costs (revenue and productivity)
Current
With SilentDefense
Total costs of cybersecurity threats
Current
Savings with SilentDefense
With SilentDefense

Reduced number of security events

Annual savings potential
TCO Comparison
Despite the many benefits brought by networking and IT / OT convergence, most organizations are challenged by the evolving ICS cyber threat landscape.
This is greatly due to a lack of cyber hygiene and early detection capabilities that undermine the ability to effectively detect and respond to security threats. As a result, many organizations fall victim to ICS threats that could have been prevented.

DID YOU KNOW ...

69%

consider the current threat to their ICS systems to be high or severe / critical (SANS Institute)

64%

give third-party IT vendors complete or high-level access (Forrester Consulting on behalf of Fortinet, January 2018)

76%

of industrial sec ops respondents indicate the likelihood of a cyber-attack is "very or extremely high" (World Economic Forum)

44%

were unable to identify the source of the infiltration, and 15% reported needing more than a month to detect a breach (SANS Institute)

THE BOTTOM LINE

How can you proactively improve your ability to better detect and respond to threats?
WHAT IF YOU COULD ...
  • Proactively understand, prioritize, and mitigate risks for all assets
  • Better detect known and unknown threats
  • React immediately and recover faster

SilentDefense delivers with asset inventory and vulnerability assessment which includes:

Network monitoring
Threat hunting
Security event response
Integration into your existing eco system

THIS CAN HELP ...

Reduce the time and effort understanding threats and prioritizing patches and prevention
Lower mean time to detect and resolve realized threats
Reduce the risk of a security event occurring, and the impact scope should an event occur
Reduce the workload to manage the ICS network security
Compliance and risk management FTEs
Current
Savings with SilentDefense
With SilentDefense
Fully loaded salary
Current
With SilentDefense
Total annual cost for compliance and risk management FTEs
Current
Benefit
Proposed
Annual third party audit costs
Current
Savings with SilentDefense
With SilentDefense
Fees should a non-compliance issue occur
Current
With SilentDefense
Annual risk of recurrence of non-compliance
Current
Savings with SilentDefense
With SilentDefense
Average annual risk cost of non-compliance (risk * fees)
Current
Savings with SilentDefense
With SilentDefense
Total compliance labor and risk costs (labor cost + risk cost)
Current
Benefit
Proposed

Productivity gained (equivalent FTEs)

Annual savings potential
TCO Comparison
We find that most organizations struggle to implement and maintain compliance with cybersecurity frameworks, internal policies, and regulatory standards.
Trying to achieve compliance is inefficient, costing many hours and budget spend. And even with this, there are insurance challenges, and remains a possibility of penalties and fines.

DID YOU KNOW ...

32%

of companies are spending more than 1/4 of their IT security budget on compliance mandates (SANS Institute 2015)

46%

say compliance was a top selection for setting IT security spending priorities (Infosecurity Magazine – 2015)

90%

YoY increase in respondents stating reduction in the compliancy burden is a success factor that can strengthen their organization’s cybersecurity posture (Ponemon 2018)

THE BOTTOM LINE

How do you reduce the risk of compliance issues while not unduly increasing the compliance burden?
WHAT IF YOU COULD ...
  • Effortlessly verify that your employees are complying with security policies
  • Be alerted if there is a policy violation
  • Reduce effort required to produce internal and external audit documentation

SilentDefense delivers with…

Inventory information and controls to enable standards and guidelines
Continuous validation of compliance
Documentation of compliance issues and risks to avoid penalties and fines

THIS CAN HELP ...

FTE staff avoidance - compliance team - reduce the cost of maintaining compliance
Auditing savings - lower reporting and auditing costs
Reduce insurance costs and assure coverage
Avoid compliance penalties and fines
Annual downtime hours (planned and unplanned)
Current
Savings with SilentDefense
With SilentDefense
Revenue impact
Average revenue per hour for the organization
Current
Savings with SilentDefense
With SilentDefense
Operating margin
Current
With SilentDefense
Percentage of outage impact that will not be recovered
Current
With SilentDefense
Revenue downtime cost per hour
Current
Savings with SilentDefense
With SilentDefense
Total revenue downtime impact
Current
Savings with SilentDefense
With SilentDefense
Productivity impact
Successful security events per year
Current
Savings with SilentDefense
With SilentDefense
Average cost per FTE experiencing downtime
Current
With SilentDefense
Total productivity downtime impact
Current
With SilentDefense
Total downtime costs (revenue and productivity)
Current
Savings with SilentDefense
With SilentDefense

Reduced number downtime hours

Annual savings potential
TCO Comparison
Most organizations suffer from avoidable downtime due to unforeseen problems caused by network misconfigurations, faulty devices, human error, and malicious activity.

DID YOU KNOW ...

#1

reliability and availability is the number one concern of ICS asset owners (SANS Institute)

42%

“People and Context Factors” was the root cause of the largest fraction of unplanned downtime incidents (ARC)

$260,000

The average cost per unplanned downtime hour is $260,000, with $140,000 for petrochemical, $40,000 for pharmaceutical, $30,000 for food processing, and $1.3M for auto industry manufacturing (Multiple sources: Contingency Planning Research & Schneider Electric, ATS Survey, Aberdeen Group)

THE BOTTOM LINE

How can you proactively avoid issues to reduce the likelihood of unplanned downtime events?
If an issue does occur, how do you get up and running more quickly?
WHAT IF YOU COULD ...
  • Inventory assets and vulnerabilities to help prioritize and mitigate threats
  • Maintain compliance to avoid changes and human error that can cause unplanned downtime
  • Better detect and mitigate infrastructure issues, operational threats, and security threats to get the problem resolved and operations up and running again should an issue occur

SilentDefense delivers with:

Asset inventory to assure real-time awareness
Change and behavior tracking to limit risk of human error
Threat intelligence to prioritize and proactively mitigate threats
Rich alert details facilitating root cause analysis
Automated large industrial threat libraries that eliminate manual investigation tasks
Detect and mitigate threats more quickly and effectively

THIS CAN HELP ...

Reduce the risk of an unplanned downtime event occurring
Limit the downtime costs with scope awareness and faster mitigation / recovery
Annual revenue
Current
With SilentDefense
Percentage of additional revenue lost by not meeting customer security requirements
Current
Savings with SilentDefense
With SilentDefense
Total lost revenue opportunity
Current
Savings with SilentDefense
With SilentDefense

Annual savings potential
TCO Comparison
If your ICS is hit by a security breach, research shows a high direct cost in mitigating the issue, and a much higher impact on your company’s business and reputation. You are at risk of losing potential customer revenue by not meeting their security requirements.

DID YOU KNOW ...

79%

of SCADA / ICS operators reported a breach in the past 24 months. Breaches compromise the safety of employees and organizations’ financial stability (Forrester Consulting on behalf of Fortinet, January 2018)

34%

believe their systems have been breached more than twice in the past 12 months and a high 32% of those with an ICS breach are unsure of how many times they had been breached (SANS Institute)

2100%

the increase over the past three years in cybersecurity events affecting ICS. These include targeted attacks by well-funded organizations, including both nation-states and terrorist groups (U.S. Department of Homeland Security’s ICS Cyber Emergency Response Team)

THE BOTTOM LINE

What are your chances of an ICS security breach?
How long will it take you to recognize the event and effectively respond?
What can you do to limit security risks and protect your reputation?
WHAT IF YOU COULD ...
  • Understand your ICS and network assets better to prioritize threats and proactively reduce the risk of a security breach
  • More reliably and quickly detect an event should it occur
  • Faster mitigate the threat to limit damage scope

SilentDefense delivers with:

Real time asset inventory to assure visibility
Threat intelligence to prioritize risks and proactive mitigation
Detect and respond to security events
Support for compliance processes

THIS CAN HELP ...

Reduce the risk of a security event
Mitigate issues faster to reduce direct business and reputational costs
Year 1
Year 2
Year 3
Total Savings