
Cyber insurance coverage declare values are an efficient strategy to quantify the impression of cyberattacks on organizations. The next declare worth signifies that the sufferer skilled appreciable monetary and operational penalties from the assault, whereas a low declare worth displays restricted disruption.
Lowering the worth of cyber insurance coverage claims is to everybody’s benefit. For shoppers, decrease claims display improved cyber resilience whereas insurers profit from decrease payouts. It additionally creates a virtuous circle: If insurers are spending much less protecting claims, they’re able to drop premiums, delivering additional benefit to shoppers.
Whereas there may be broad consensus that stronger defenses scale back the monetary and operational impacts of cyberattacks and the worth of the ensuing claims, nobody has been in a position to quantify it. Till now.
Sophos lately commissioned a vendor-agnostic examine to quantify the monetary impression of assorted cyber controls on cyber insurance coverage declare values. The examine reveals the differing impression of endpoint safety options, EDR/XDR applied sciences, and MDR providers on attack-related claims, offering helpful insights for insurers and organizations alike.
Key findings on this examine embrace:
- Organizations that use MDR providers declare 97.5% lower than those who depend on endpoint safety alone ($75,000 vs $3M).
- Organizations that use EDR/XDR options declare one-sixth (1/6) that of organizations that solely use endpoint safety ($500,000 vs. $3M).
- Organizations that use MDR providers have probably the most predictable claims; those who use EDR/XDR instruments have the least predictable.
- Organizations that use MDR providers get better quickest from vital cyberattacks with nearly half (47%) absolutely recovered inside every week in comparison with simply 18% of those who depend on endpoint safety alone and 27% of those who use EDR/XDR options.
- Organizations that use MDR providers have probably the most predictable restoration time from ransomware incidents; EDR/XDR customers the least.
Why this examine issues
Organizations spend huge sums on cybersecurity yearly. By quantifying the impression of cyber controls on cyberattack outcomes, this analysis allows organizations to direct their investments the place they may see best return.
In parallel, insurers exert vital affect on cybersecurity spend by requiring sure controls as situations of protection and providing reductions if others are in place. This analysis allows them to make sure that they’re incentivising the investments that basically do make a optimistic distinction to incident outcomes and the ensuing declare values.
Analysis standards
282 declare occasions from 232 organizations with between 50 and three,000 staff had been studied on this analysis program. Respondents used cybersecurity options from a variety of suppliers, together with 19 completely different endpoint safety distributors and 14 separate MDR service suppliers. All organizations had been utilizing multi-factor authentication (MFA) on the time of the claim-triggering cyberattacks. The analysis was performed for Sophos by Vanson Bourne.
Responses had been segmented into three statistically vital teams primarily based on the cyber defenses they’d deployed on the time of the claim-resulting assaults:
- Endpoint customers: Had been utilizing an endpoint safety answer for a minimum of a 12 months, however weren’t utilizing endpoint detection and response (EDR) or prolonged detection and response (XDR) instruments or MDR providers (n=63 organizations, 83 declare occasions).
- EDR/XDR customers: Had been utilizing an endpoint safety answer and an EDR/XDR instrument for a minimum of a 12 months however weren’t utilizing MDR providers (n=109 organizations, 129 declare occasions).
- MDR customers: Had been utilizing an endpoint safety answer and an MDR service for a minimum of a 12 months (n=60 organizations, 70 declare occasions).
We use this phase terminology all through the report.
For the avoidance of doubt, the analysis focuses solely on claims ensuing from cyberattacks and excludes claims made on a cyber insurance coverage coverage for different causes (for instance, the enterprise impression of cybersecurity vendor outages or unintentional knowledge loss).
Discovering #1: Organizations that use MDR providers declare 97.5% lower than those who depend on endpoint safety alone
The analysis reveals that the median declare worth by organizations utilizing MDR providers is 97.5% decrease than that of endpoint customers. The typical (median) declare by MDR customers was simply $75,000 in contrast with $3M for endpoint customers. Put one other approach, endpoint customers usually declare 40X extra because of cyberattacks than MDR customers. The decrease declare worth possible displays the power of the MDR service to rapidly detect and neutralize malicious exercise, ejecting adversaries earlier than critical harm is completed.
The information additionally affirms the good thing about utilizing an EDR or XDR instrument along with endpoint safety, with the common declare by EDR/XDR customers coming in at one sixth (1/6) that of endpoint customers ($500,000 vs. $3M).

FINDING #2: MDR customers have probably the most predictable claims; EDR/XDR customers the least predictable
Declare predictability is a vital indicator of the consistency and reliability of cyber controls in lowering the impression of cyberattacks. To know how completely different controls evaluate, a theoretical instance declare for a company with $100M annual income was modeled for every of the segments. That is primarily based upon the output outcomes generated from the multi-variate regression mannequin used for the evaluation (see ‘In regards to the survey’ on the finish of this weblog for extra particulars).
The evaluation reveals two essential insights:
- MDR customers’ claims are the most predictable
- EDR/XDR customers’ claims are the least predictable
The predictability of MDR customers’ claims displays the consistency with which MDR suppliers rapidly detect and neutralize threats. By offering 24/7 monitoring, investigation, and response delivered by safety operations specialists, MDR providers can take swift motion at any time of the day or night time.
Steady protection is especially essential provided that many adversaries intentionally goal “off hours” to hold out their assaults within the hope that it’ll delay detection till they’ve achieved their targets – evaluation by Sophos X-Ops reveals that 91% of ransomware assaults begin exterior the usual enterprise hours of 8am-6pm, Monday to Friday.
The unpredictable nature of claims by EDR/XDR customers demonstrates that the efficacy of those instruments in stopping cyberattacks earlier than main harm is completed is wholly depending on the talents and responsiveness of the consumer. Some organizations use EDR/XDR instruments to nice impact, stopping assaults swiftly and successfully. Nevertheless, others should not in a position to ship efficient safety operations regardless of having invested in EDR/XDR know-how – with anecdotal suggestions suggesting that is usually because of an absence of capability to ship 24/7 protection and/or a scarcity of experience.
The invention that EDR/XDR customers’ claims cowl a wider band than these of endpoint customers additional means that the poor use of those instruments can, in truth, exacerbate the scenario. For instance, organizations might delay bringing in exterior incident response specialists to help whereas they attempt to resolve the scenario themselves.

FINDING #4: MDR customers have probably the most predictable restoration time from ransomware incidents; EDR/XDR customers the least
Modeling restoration time primarily based on a theoretical instance of a company that experiences a major ransomware assault reveals appreciable variation primarily based on the safety management used. On this evaluation we modeled each the restoration window (the time between the quickest and slowest potential restoration) and likewise the anticipated restoration time primarily based on the common restoration time reported.
- Endpoint customers are “mid-table” with a 40-day restoration window and predicted restoration time of 40 days.
- EDR/XDR customers are the slowest to get better, with each the widest restoration window (66 days) and the longest predicted restoration time (55 days).
- MDR customers get better quickest, with a five-day restoration window and a predicted restoration time of simply three days.
These findings additional display that utilizing an MDR service materially reduces the impression of cyberattacks on organizations. It additionally reveals the extremely unpredictable nature of EDR/XDR customers’ restoration. It’s essential to remember that EDR/XDR options are instruments, and their efficacy and impression is dependent upon how effectively they’re used.

Conclusion
The analysis confirms what many have recognized instinctively: the kind of cyber controls used has a cloth impression on cyber insurance coverage claims. MDR customers have each the bottom and most predictable declare values. Endpoint customers have the best common declare worth, whereas EDR/XDR customers have the least predictable declare worth.
Cyberattacks are inevitable. How organizations defend in opposition to them just isn’t. These findings are a great tool for organizations that need to optimize their cyber defenses and cybersecurity return on funding, and for insurers trying to scale back publicity and make right-sized coverage affords to shoppers.
In regards to the survey
The analysis was performed for Sophos by Vanson Bourne within the second half of 2024 and coated claims ensuing from cyberattacks that had occurred throughout the earlier 12 months. All findings have been topic to rigorous and sturdy statistical validation, utilizing multi-variate regression fashions.
These fashions take the first variable (on this case, the safety answer used) and evaluate how this impacts different key variables (reminiscent of declare quantity, and restoration time). Management variables (group sector, group measurement, sort of cyber insurance coverage, stage of safety posturing on the time of assault, standing of declare) had been additionally constructed into the fashions. The findings outlined on this report are the conclusions of those analyses.