TCO-report.79306fd091c7ca5356c1
TCO-report.79306fd091c7ca5356c1
TCO-report.79306fd091c7ca5356c1
US O
B
W
S,
S,
GROW
IND
IA GR
TAL
O
GI
W
I
D S
© SKOCH
About
Research by SKOCH Consultancy Services Pvt Ltd is considered a benchmark in India
and is relied upon by corporations, governments, regulators and financial institutions
alike for it's key inputs into decision and policy making. It has published over twenty
books based on original research, which are used not just as reference material but also
extensively recommended in academia and policy making.
SKOCH comes out with annual reports that cover India in 360 , from governance to
digital transformation and from micro-credit to economic progress. We are known for our
meticulous and exhaustive methodology and a consultative approach that works through
forming multi-stakeholder task forces in areas of public interest. A few of the currently
active task forces are:
CIO Agenda Task Force
Financial Inclusion Task Force
Cyber Security Task Force
ESG Task Force
The Task Force reports help make knowledge-based arguments based on primary
research. Large corporations, governments and the public sector commission SKOCH
for primary research.
This report has been made through a Task Force, Primary Interviews, Research Meetings
and Proof-of-Concept centres.
Contents
Introduction
Sameer Kochhar
1. Markets, Big Business and Social Legitimacy
N
Montek S. Ahluwalia
andan Nilekani earned his place as an iconic entrepreneur in India in the 1980s,
2. Two Issues in India’s Growth Story
having co-founded Infosys Limited in 1981. In the post-economic liberalisation era,
C. Rangarajan
he cemented his reputation as a pioneer in the corporate and information technology
world, just as he helped launch Infosys into the big league of world’s IT-enabled services 3. Advocacy & Governance
companies. He served as the company’s Chief Executive Officer from 2001 to 2007. Rohan Kochhar
4. Vision for a Transparent, Efficient and
At the fag end of his career in Infosys, Nilekani wrote a best-selling book in 2009, Imagining Essays in honour of
Economically Inclusive Nation
India: The Idea of a Renewed Nation. The book is widely acclaimed for heralding a new,
idea-based approach to meet the present and future challenges facing India. It spelt out the
NaNdaN NileKaNi Kiran Mazumdar Shaw
5. Challenges of Economic Governance
theoretical framework for the provision of a unique identity for all its citizens as an important
Editor Rajiv B. Lall
Sameer Kochhar, Chairman of Skoch step towards putting, what Nilekani called, “human capital front and center as the main driver
Group, is a passionate advocate of social, of productivity and growth”. Sameer Kochhar 6. Two Steps Forward for Financial Inclusion
Rana Kapoor
financial and digital inclusion. In 1997,
His long experience in the corporate world and his passion for the citizen empowerment—
after spending 15 years in the corporate 7. War Against Corruption: The Secret Weapon
as proved in the successful Bangalore Agenda Task Force experiment started in 1999 as Contributors
world, he decided to follow his inner calling Called Aadhaar
and become a development thinker. Ever well as enunciated in his 2009 book—made him the natural choice to be the first chairman moNteK S. ahluwalia Surjit S. Bhalla
since, he single-mindedly applied himself of the Unique Identification Authority of India (UIDAI) that was being set up by the Union
to the rigours of self-education, academic government to provide residents of India with a unique identity and a digital platform—known c. raNgarajaN 8. Corporate Governance Standards in India –
Editor
and became the lynchpin to the government’s welfare programmes that seek to achieve these
as part of this endeavour. His expert rajiv B. lall M. Ramachandran
opinion is sought by the government. In goals. It also set the stage for an efficient and transparent mechanism to monitor government
10. The Security Implications of Aadhaar
Kochhar’s thinking, writings and activities, programmes, which is crucial to cut waste and slippage in order to maintain fiscal prudence raNa Kapoor
Gursharan Dhanjal
his profound admiration for India’s at the national level. Surjit S. Bhalla 11. Management Rather than Civil Service:
economic reforms – and in extension,
those outstanding personalities who strive
The authors of the essays in this volume are accomplished experts in their respective chitra ramKriShNa Opportunities for Radical Reform in India
to make these reforms more meaningful fields. Together, they piece together a wide range of issues relevant to India’s present and Meghnad Desai
future: fiscal and monetary policies, political and economic governance, financial sector
m. ramachaNdraN
and broad-based – comes out clear and 12. Enabling and Sustaining a Stable Rules-
unambiguous. reforms, financial inclusion, urban development, corporate governance, competitive markets, gurSharaN dhaNjal Based Regime
food security, national security, public policy advocacy and information & communication
In addition to authoring highly acclaimed meghNad deSai Cyril Shroff
technology. The volume not only offers clear-cut analyses on these topics, but also a clear
Speeding Financial Inclusion (2009), 13. Enhancing Food Security through Aadhaar
vision for the future. cyril Shroff N.C. Saxena
and, ModiNomics - Inclusive Economics,
Inclusive Governance (2014), he has N.c. SaxeNa 14. The Importance of Aadhaar
edited Infrastructure and Governance
(2008); Financial Inclusion (2009); Urban
jaNmejaya SiNha Janmejaya Sinha
Renewal: Policy and Response (2009); S.S. tarapore 15. Governance Issues in the Financial Sector
India on the Growth Turnpike: Essays in S.S. Tarapore
Honour of Vijay L. Kelkar (2010); Building
laveeSh BhaNdari
16. Risks in the Indian Financial Sector: The
from the Bottom: Infrastructure and Poverty Sumita Kale Role of Aadhaar
Alleviation (2010); Growth and Finance: Laveesh Bhandari and Sumita Kale
Essays in Honour of C. Rangarajan (2011);
aShima goyal
17. Closing the Gap Between Potential and
Policymaking for Indian Planning: Essays in pradeep S. mehta Performance in ICT
Honour of Montek Singh Ahluwalia (2012);
Ashima Goyal
and, An Agenda for India’s Growth: Essays
in Honour of P. Chidambaram (2013) 18. Competition Policy: 2nd Big Wave of
Economic Reforms
Pradeep S. Mehta
SKOCH MEDIA PVT. LTD.
` 1095 Cover Photo: SKOCH Media
Table of Contents
Executive Summary.............................................................................4 Consulting Team*
Dr Gursharan Dhanjal
Key Findings
Shivam Chaudhary
Overall Benefits..........................................................................5
IT Impact...................................................................................5
Business Impact........................................................................5
Stakeholder Engagement............................................................6
Risk Management......................................................................6
Environmental Impact.................................................................6
Methodology........................................................................................16
Key Findings........................................................................................17
IT Impact...................................................................................18
IT Cost Savings..........................................................................20
Stakeholder Engagement............................................................22
Risk Management......................................................................24
Environmental Impact.................................................................26
Set Up Costs..............................................................................28
Disclosures
This is an independent report. Readers are urged to employ their evaluations and studies to make purchase decisions. It is not
meant to be used as competitive analysis.
SKOCH makes no assumptions or claims into whether or not ROI will be received by the organisations. Readers are strongly
advised to make their own estimates within the framework provided in the study to determine appropriateness of an investment.
SKOCH has received inputs through interviewees, research meetings and feedback from the members of the Task Force but
maintains editorial control over the study and its findings. All trademarks are the property of their respective owners.
©SKOCH. All rights reserved. This report is a copyright. Information is based on the best available resources. Opinions reflect
judgment at the time and are subject to change. Subject to statutory exception and to the provisions of relevant collective
licensing agreements, no part of this report may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording or by any information storage and retrieval system, without the express written
permission.
*Dr Gursharan Dhanjal is Vice Chairman, SKOCH Group & Shivam Chaudhary is Senior Consultant, SKOCH Group
Executive Summary
The highest priority for Indian enterprises is to expand business while reducing cost and
doing so with security and sustainability. Securities and Exchange Board of India (SEBI)
has mandated that top 1,000 listed enterprises have to follow Environmental, Social and
Governance (ESG) guidelines and report them as part of their Annual Report. India has some
of the most stringent Data Protection and Intermediary Liability laws at the national level and
sector specific regulatory guidelines.
Globally most enterprises look at customer satisfaction as the highest priority and some look
at employee satisfaction for enhancing customer satisfaction. While this too is a priority, it
is only second to the topmost priorities. Therefore, it was decided to create an India specific
model that we call Comprehensive Economic Impact (CEI) that can be used to better articulate
business benefits to the Boards for deploying Macs at the endpoint.
This model was developed as a collaborative effort of fifteen enterprises CIOs that participated
in CIO Agenda Task Force, seven large enterprises shared their data on MACs and PCs and two
of them were used as proof-of-concept centres to further fine tune and validate the findings.
This exercise was carried out over a 10-month period.
$1=INR 83
© SKOCH 4
Key Findings
Overall Benefits
The financial analysis a unified organisation with 10,000 employees and deploying 46%
Macs in four years experiences overall benefits of 998.35 Cr ($11.55 Mn) vs set-up costs
of 226.95 Cr ($3.23 Mn). The set-up costs include the purchase price and software minus
the residual value after four years.
The benefits calculated are a sum total of IT Impact; IT Cost Savings; Business Impact;
Risk Management; Shareholder Engagement; and, Environmental Impact. This amounts to
a net benefit of 771.40 Cr ($8.31 Mn) and an ROI of 257.1%.
© SKOCH 5
Key Findings
“
the productive time of the organisation.
Benefits (Four-Year)
Cost/Benefit Analysis
© SKOCH 7
The India Context
1. https://www.currentware.com/blog/employee-cloud-dlp/
2. Panaseer Security Leaders Peer Report 2022
3. https://ciso.economictimes.indiatimes.com/news/cyber-security-breaches-are-up-manifold-as-internet-penetration-grows/98078741
4. https://inc42.com/buzz/india-witnessed-18-mn-cyberattacks-2-lakh-threats-a-day-in-q1-2022-google/
5. https://www.deccanherald.com/india/data-of-815-crore-citizens-up-for-sale-in-biggest-data-breach-in-india-report-2749794
© SKOCH 8
The India Context
“
Paravihan Portal, Government of India: In August 2023,
Cyber security firm CloudSEK reported that the government’s
Parivahan website suffered a data breach, exposing it's source
code and sensitive data of 10,000 users. The cyber security
firm detected the data breach on 2 August. “Our source was
able to obtain the source code, totalling 165 MB in size. Most If you suffer an attack
of the code is written in PHP,” says CloudSEK. On 7 August
2023, the same threat actor made another post sharing a like the AIIMS instance,
sample dataset of the 10,000 users of the website, the cyber
security firm said. The post also mentions that SQL injection
your operations
was used to obtain the data from the vulnerable API endpoint.6 suffer, data gets
Piramal Group: The Piramal Group attack was discovered compromised and
in May 2023. The BianLian Ransomware gang claimed
responsibility for the alleged Piramal Group cyber attack. brand value depletes!
The modus operendi reported was that BianLian actors used I talk to CFO and CEO
PowerShell and PC Command Shell to disable antivirus tools
and modify Registry settings.7 They also employed network and Board when I have
and Active Directory enumeration techniques and harvested
credentials to move laterally within the network. The threat
to justify how security
actor claimed access to 870 GB of data including financial is tied to the brand as
information, accounting information, project data and personal
information. well as financial health
Fullerton India: In April 2023, Fullerton reported a hack and of the organisation.
LockBit leaked 600 GB of data. It was confirmed by the LockBit
ransomware Darknet, where hackers listed the company and
This also has to be
over a month later, published all the leaked information.8 justified to the audit
AIIMS: In November 2022, 5 AIIMS servers were hacked, 1.3 committee that it is
TB of data Encrypted was compromised. As per preliminary
analysis, servers were compromised in the information because of the efforts
technology network of AIIMS by unknown threat actors due
to improper network segmentation, which caused operational
disruption due to non-functionality of critical applications.9
of the IT team that the
entire enterprise has
“
In June 2023, a malware attack was detected by AIIMS cyber
security systems. The attempt was successfully thwarted
remained safe.
and the threat was neutralised by the deployed cyber security
systems as reported by CERT-In.10
CIO
Manufacturing Industry
6. https://www.fortuneindia.com/macro/govts-parivahan-website-likely-suffered-data-breach/113725
7. https://thecyberexpress.com/piramal-group-cyber-attack-bianlian-ransomware/
8. https://ciso.economictimes.indiatimes.com/news/data-breaches/breaking-over-600-gb-of-fullerton-indias-data-published-on-dark-web/100057322
9. https://thewire.in/government/aiims-servers-cyberattack-ransomware-rajya-sabha
10. https://www.livemint.com/news/india/aiims-delhi-hit-by-fresh-cyberattacks-details-here-11686061994629.html
© SKOCH 9
The India Context
State Bank of India (SBI): In October 2022, cyber security Failure to invest in endpoint protection can have serious
researchers from AI-driven Singapore-headquartered implications for businesses. Companies that face a debilitating
CloudSEK discovered a threat actor advertising a database cyber attack can suffer from:
of 1.2 Mn cards for free on a Russian-speaking Dark Web
Reputational loss
cyber crime forum. This followed another incident of 7.9 Mn
cardholder data advertised on the BidenCash website. This Loss of loyal customers
included data belonging to customers of the SBI.11 Poor employee morale
Leakage of sensitive data and information
Air India: In 2021, the company suffered a data breach that Disruptions to business operations
exposed the personal information of over 4.5 Mn customers. Negative revenue impact
The breach was caused by a vulnerability in an endpoint Loss of contracts or business partnerships, among
device used by an Air India employee.12 others
Bengaluru Power Outage: A power outage in Bengaluru in In its Cost of a Data Breach Report17, released by IBM in July
2020 was reportedly caused by a cyber attack, possibly due 2023, it showed the average cost of a data breach in India
to an endpoint security failure, raising concerns about critical reached $17.76 Cr ($2.14 Mn) in 2023 – an all-time high and
infrastructure vulnerabilities.13 almost a 28% increase since 2020. Detection and escalation
costs jumped 45% over this same time frame, representing
Flipkart: In 2020, the company was hacked by a group of the highest portion of breach costs and indicating a shift
attackers who gained access to the company’s network towards more complex breach investigations.
through a vulnerable endpoint device. The attackers stole the
personal information of over 10 Mn Flipkart customers.14 At nearly 22%, the most common attack type in India was
phishing, followed by stolen or compromised credentials
Paytm: Same year, the company suffered a data breach (16%). Social engineering was the costliest root cause of
that exposed the personal information of over 30 Mn Paytm breaches at $19 Cr ($2.29 Mn), followed by malicious
customers. The breach was caused by a vulnerability in an insider threats, which amounted to approximately $18.67 Cr
endpoint device used by a Paytm employee.15 ($2.25 Mn).18
11. https://www.cnbctv18.com/technology/cowin-data-leak-here-are-the-biggest-breaches-in-indias-history-16909071.htm
12. https://www.businesstoday.in/latest/trends/story/exclusive-if-you-flew-air-india-your-data-could-be-compromised-346626-2022-09-07
13. https://www.thehindu.com/news/cities/mumbai/cyber-sabotage-led-to-october-2020-outage-in-mumbai-minister/article33964939.ece
14. https://www.businesstoday.in/industry/it/story/ecommerce-scam-chinese-hackers-targeted-indian-shoppers-during-flipkart-fes-
tive-sales-282012-2020-12-19
15. https://www.indiatoday.in/technology/news/story/personal-data-of-3-4-million-paytm-mall-users-reportedly-exposed-in-2020-data-
breach-1980690-2022-07-27
16. https://www.expresscomputer.in/news/identity-theft-ongc-falls-prey-to-cyber-fraud-loses-rs-197-crore/14185/
17. https://in.newsroom.ibm.com/IBM-Report-Average-cost-of-a-data-breach-in-India-touched-INR-179-million-in-2023. The Cost of a Data Breach
Report 2023, now in its 18th year, delivers essential insights to help security and IT teams better manage risk and limit potential losses.
18. https://www.ibm.com/reports/data-breach?_gl=1*1ggqhup*_ga*MTI5NjMwMjkxNi4xNjk1NjI4MzUz*_ga_FYECCCS21D*MTY5NTY0ODQ0OS42L-
jEuMTY5NTY0ODY2OC4wLjAuMA. Also see,
https://timesofindia.indiatimes.com/gadgets-news/average-cost-of-data-breach-in-india-has-hit-all-time-high-this-year-warns-ibm-report/article-
show/102112850.cms
© SKOCH 10
The Global Context
Frequency of Endpoint attacks In August 2023, LockBit stole 10 GB of data from Zaun
Ltd, UK based security fencing company by compromising
Global Incidents a “rogue” PC connected to an otherwise secure network.24
Security experts said, the theft was a reminder of the
According to a study by the Ponemon Institute, published in prevalence of outdated, unsupported and vulnerable devices
January 2020, 68% of organisations worldwide experienced linked to industrial networks and the risks they posed to entire
one or more endpoint attacks that successfully compromised supply chains. “However, we can now confirm that during the
data. The same report said that the frequency of endpoint attack LockBit managed to download some data, possibly
attacks had increased since the year before.19 limited to the vulnerable PC but with a risk that some data
Employer-owned desktops and laptops are the most often on the server was accessed. It is believed that this is 10
compromised endpoints. The types of endpoints reported GB of data, 0.74% of our stored data,” said Zaun in a breach
being compromised – employer owned desktops (69% total) update.25
and laptops (67%) top the list.20 A further study by Check ET CISO also reported that California based
Point also reported a rise, finding that, throughout 2021, the ultimageimpageprinting.com was also in LockBit 3.0’s victims
weekly average of ransomware attacks targeting corporate list. Other firms targeted were abro.se, which landed up
networks increased by 50%, compared to 2020.21 compromising 136 GB of data and GoForCloud.com.26
Email accounts for 94% of malware delivery methods — According to IBM, the global average cost of a data breach
web-based attacks account for 23% of cases, while Office in 2023 was $36.93 Cr ($4.45 Mn), a 15% increase over the
documents were used in 45% of cases.22 last 3-years. More than 51% of organisations are planning to
Examples of Recent Global Instances of Endpoint Attacks:23 increase security investments as a result of a breach, including
incident response (IR) planning and testing, employee
LockBit attack on Fersen – Turkey’s largest vinegar training and threat detection and response tools. It says, the
producer – 20 September 2023. average savings for organisations that use security AI and
automation extensively is $14.60 Cr ($1.76 Mn) compared to
ALPHV attack on Al Ashram – UAE’s leading
organisations that don’t.27
construction company – 20 September 2023.
Ragnar_Locker attack on Fructa Partner – France’s
largest fruit juice and non-alcoholic beverage
producer – 20 September 2023.
Medusa attack on Auckland Transport – Auckland
Council is responsible for transport projects and
services – 19 September 2023.
Akira attack on GLOVIS America – Major third party
logistics service provider in US and Canada – 19
September 2023.
19. https://www.morphisec.com/hubfs/2020%20State%20of%20Endpoint%20Security%20Final.pdf
20. https://cybriant.medium.com/15-shocking-stats-about-endpoint-security-solutions-c1f8e1f8a5c
21. https://blog.checkpoint.com/security/check-point-research-cyber-attacks-increased-50-year-over-year/
22. https://www.infosecurity-magazine.com/news-features/ten-2019-dbir-1-1-1-1/
23. https://www.breachsense.com/breaches/
24. https://www.zaun.co.uk/zaun-data-breach-update/
25. https://www.zaun.co.uk/zaun-data-breach-update/
26. https://ciso.economictimes.indiatimes.com/news/data-breaches/fullerton-india-resumes-operations-following-lockbit-3-0-ransomware-at-
tack-no-word-on-stolen-data/99761942
27. https://www.ibm.com/reports/data-breach
11
© SKOCH 11
CIO Agenda Task Force (CATF)
Indian CIOs are amongst the best in the world and therefore,
fully appreciate the enormous financial, compliance,
regulatory and operational risk associated with having
and now more prevalent Total Economic Impact (TEI) model
of Forrester Research. The Task Force found that the Forrester
TEI model was the closest in terms of a 360 evaluation, it
vulnerable systems deployed at the endpoint instead of more could not be used entirely in the Indian context because of the
reliable Macs. At the same time, they do end-up deploying following reasons:
vulnerable PC systems due to a lack of knowledge-based
argument to get reasonable budgets allocated. The highest priority for Indian enterprises is to expand
business while reducing cost and doing so with
The CIO Agenda Task Force (CATF) was formed to better security and sustainability.
understand as to why this is the case? Securities and Exchange Board of India (SEBI) has
It co-opted CIOs from 15 large enterprises as members mandated that top 1,000 listed enterprises have to
representing a diverse group from across industry segments follow Environmental, Social and Governance (ESG)
including Manufacturing, Financial Services, Markets, guidelines and report them as part of their Annual
Infrastructure, Digital Platforms, Banking, Asset Management Report.
Companies, Mutual Funds, Pharmaceuticals, Health and Some of the key performance indicators under these
Media. are as follows:
Risk Management, including:
In December 2022, the CIO Agenda Task Force held its first
I. Compliance Risk
research meeting and concluded the following:
II. Operational Risk
The endpoint security is a clear and present danger. III. Financial or Economic Risk
IV. Reputational Risk
Work From Home (WFH) and Work From Anywhere
(WFA) culture is further making the job of the Stakeholder Engagement including Employees
protecting enterprise systems difficult. and Customers
While Boards are quite sensitive to regulatory, Environmental Protection including Reduction in
compliances, financial and operational impact of Carbon Footprint and Energy Savings
endpoint security failures, it is a tough sell to get India has some of the most stringent Data Protection
higher budgets allocated to procure more secure and Intermediary Liability laws at the national level
Macs for the endpoints. and sector specific regulatory guidelines.
It was also decided to examine various cost evaluation Globally most enterprises look at customer
models and propose a model that takes into account satisfaction as the highest priority and some look
the Indian use case, which then can be presented at employee satisfaction for enhancing customer
as a knowledge-based quantifiable argument to the satisfaction.
Boards. While this too is a priority, it is only second to the
To this end, the Task Force examined various models like topmost priorities.
Total Cost of Ownership (TCO), Return on Investment (ROI)
“
Forrester model is focused on impact of employee
experience and having delivered a good experience;
better business outcomes, such as higher employee
engagement, enhanced customer experience and
reduced cost.
Therefore, it was decided to create an India specific We used to discuss
model that is called Comprehensive Economic
Impact (CEI) that can be used to better articulate
TCO and ROI. In
business benefits of deploying Macs at the endpoint. modern parlance
The benefits reflect the four-year financial analysis
associated with the unified organisation. these have subsumed
From the information and inputs provided by the into Comprehensive
interviewees, the Task Force constructed a CEI
framework for those organisations considering Economic Impact
adoption of Mac at the endpoints.
(CEI). It is necessary
Industry Region Interviewee Employees
to create a
Asset Management National CIO 5,000+ knowledge-based
Automotive National CIO 30,000+ argument for
Banking National CIO 85,000+
endpoint security to
Digital Platforms National CIO 5,000+
include, sustainability,
e-Commerce National CIO 5,000+
Hydrocarbon
National
National
CIO
CIO
62,000+
22,000+
involvement
and employee
“
Manufacturing National CIO 6,000+
satisfaction.
Media National CIO 11,000+
© SKOCH 13
Task Force Discussion Areas
“
The importance of considering endpoints and
security in the IT ecosystem is widely acknowledged.
The Task Force stressed on the adoption of a holistic
approach, stressing the constant evolution of security
measures to counter increasing endpoint threats.
Organisations need to look into a structured approach Most of the CIO have
to sustainability to encompass business, economic,
security, compliance and sustainability impact of IT
annual operating
solutions. plans and budgets,
Securing the network, endpoints and connectivity
entails a complex, many-to-many relationships,
which they have to
necessitating a shift in security paradigms. justify. Now we have
Protecting sensitive assets within data centres is a
continuous effort, with organisations facing a barrage
to go and explain
of cyber threats, particularly Distributed Denial-of- what is the business
Service (DDoS) attacks. Importance of vigilance at
the endpoint level need to enhance and users need to opportunity we are
be sensitised. going to bring and
Standardisation in networking enhances
interoperability and minimises risks associated with what innovation
reliance on particular vendors.
Digital transformation requires investments in capital
intensive areas and organisations should justify
“
are we planning to
bring to table to help
such investments. Safer networks allow continuous business grow.
innovations and should form part of Annual Operating
Plans (AOPs). If one looks at revenue and business
opportunity, then the cost part becomes only a figure
of speech.
CIO, Pharma Industry
Security issues are more prevalent today, so the
focus should be on holistic and sustainable growth
and secured scaling.
CEI is an approach to justify capital investment as it
takes into account all the potential factors that help
economise an organisation.
Organisations must focus on CEI and assess it over a
minimum period of 4-5 years.
“
choices that align with their desired outcomes. The CEI
Table 2: Comprehensive Economic Impact (CEI) Model
TCO - Total Cost of Ownership
ROI - Return on Investment
CEI - Comprehensive Economic Impact
“
T he Task Force, formed in December 2022 undertook the
following activities:
CXO
Consulting Company
© SKOCH 16
Key Findings
$1,36,824
1800.00
($1,641.95)
1600.00 $1,16,823
($1,401.93)
1400.00 Costs PC MAC
Table 3: SKOCH Analysis of Average Total Cost (A CIO Agenda Task Force Study based on data received from 7 large enterprises that currently deploy
Mac devices and PCs) – All figures are in Indian Rupees and US$
© SKOCH 17
Key Findings
IT Impact Results
To account for these risks, the SKOCH CIO Agenda
Findings Based on Interviews
Task Force adjusted this benefit downward by 10%,
It takes an IT employee 10 minutes to set up a Mac yielding a four-year, risk-adjusted total PV (discounted
for provisioning instead of 120 minutes for a PC. at 10%) of approximately $4.48 Cr ($538,000).
The average fully burdened hourly salary for an IT
Conclusions
full-time employee (FTE) is $886 ($10.86).
Each PC user creates an average of three support There is reduced opportunity cost of downtime per
tickets per year. Mac.
Mac users create 25% fewer tickets than PC users Mac users create fewer tickets than PC users.
and each ticket costs 25% less to resolve than those
for PCs.
An IT FTE can manage an average of 200 PCs
compared to 500 Mac devices.
Risks
The average fully engaged salary of an IT FTE.
Whether or not the organisation uses Apple’s best
practices when deploying Macs across the company.
IT Impact
$5.57 Cr
Four Year Total
($669,329.14)
$4.48 Cr
Four Year Present Value
($538,401.26)
© SKOCH 19
Key Findings
© SKOCH 20
Key Findings
IT Cost Savings
B3 Number of Employees Who Choose Mac B1*B2 1,000.0 1,100.0 1,200.0 1,300.0
B6 Residual Value for PCs after four years 3.47% 3.47% 3.47% 3.47%
((B3*B5) -
$6.64 Cr $8.42 Cr $10.32 Cr $12.32 Cr
B9 Subtotal: Avoided PC Costs (B3*B5*B6)) +
($797,009) ($1,011,115) ($1,238,662) ($1,479,649)
(B4*(B7+B8))
B11 Reduced Energy Costs Per Mac 80% 80% 80% 80%
$36.51 Cr
Four Year Total
($4,381,776.29)
$30 Cr
Four Year Present Value
($3,601,009.84)
© SKOCH 21
Key Findings
“
Any techy or developers you take, they find Mac
much more easier to use because of security,
speed and performance. Other endpoint devices
“
are prone to attack. Globally, corporates are
turning in favour of Mac as an enterprise operating
system.
© SKOCH 22
Key Findings
Stakeholder Engagement
Average Fully Burdened Annual $24 Lakh $24 Lakh $24 Lakh $24 Lakh
C6
Employee Salary ($28,801.15) ($28,801.15) ($28,801.15) ($28,801.15)
Average Fully Burdened Hourly $1132 $1132 $1132 $1132
C7
Employee Salary ($13.6) ($13.6) ($13.6) ($13.6)
Subtotal: Improved Producitivity C1*C2*(C3- $40 Lakh $84 Lakh $1.32 Cr $1.84 Cr
C9
from Quicker Start-Up C4)/60*C5*C7*C8 ($48,001.92) ($100,804.03 ($158,406.33) ($220,809)
C10 Number of Employees Using Mac C1*C2 1,000 2,100 3,300 4,600
Average Fully Burdened Annual $24 Lakh $24 Lakh $24 Lakh $24 Lakh
C11
Employee Salary ($28,801.15) ($28,801.15) ($28,801.15) ($28,801.15)
Average Number of Tickets Per
C12 4 4 4 4
PC Per Year
Reduced Number of Tickets Per
C13 25.00% 25.00% 25.00% 25.00%
Mac
Average Opportunity Cost of $6,268.8 $6,268.8 $6,268.8 $6,268.8
C14
Downtime per PC ($75.2) ($75.2) ($75.2) ($75.2)
Reduced Opportunity Cost of
C15 20% 20% 20% 20%
Downtime per Mac
$2.50 Cr $5.58 Cr $9.29 Cr $13.73 Cr
C16 Total Opportunity Cost for PCs
($300,912.31) ($631,915.85) ($993,010.62) ($1,384,196.63)
$27.20 Cr
Four Year Total
($2,941,138.14)
$21.80 Cr
Four Year Present Value
($2,365,820.33)
© SKOCH 23
Key Findings
Risks
The average number of breaches experienced
annually.
The overall scale and impact of a data breach.
The adoption of Mac at the organisation.
© SKOCH 24
Key Findings
Risk Management
Reduced Likelihood of
D4 50% 50% 50% 50%
Data Breach Using Mac
Cumulative Number of
D8 B4 1,000.0 2,100.0 3,300.0 4,600.0
Macs Deployed
Average Fully Burdened $1132 $1132 $1132 $1132
D9 C7
Hourly Employee Salary ($13.6) ($13.6) ($13.6) ($13.6)
Diminished/ Eliminated
D10 User Productivity Hours 3.6 3.6 3.6 3.6 3.6
Per Data Breach
Average Percentage of
D11 Employees Affected by 20% 20% 20% 20%
Downtime
Subtotal: Cost of Reduced $10.18 Lakh $21.39 Lakh $33.62 Lakh $46.86 Lakh
D12 D1*D4*D8*D9*D10*D11
Internal Productivity ($12,226.90) ($25,676.49) ($40,348.78) ($56,243.75)
$52.28 Cr
Four Year Total
($6,274,986.81)
$42.06 Cr
Four Year Present Value
($5,047,532.85)
© SKOCH 25
Key Findings
Environmental Impact has pledged to reduce its emissions by 55% by 2030 and
reach net zero by 2040. The study found that “Wipro’s
On an average, as per different industry reports, switching to
previous standard Windows laptop produced an average of
a Mac can help organisations reduce their carbon footprint by
365 kg of CO2 emissions per year. That 204 kg difference
44% on each device.29
applied across the thousands of devices, Wipro's switch to
In Year-1, after the deployment of 1,000 Macs, the Mac eliminates 27,865,890 kg of CO2 emissions per year –
unified organisation offsets 129 MT of CO2 emission. about the same as reducing 3.1 Mn gallons of gasoline CO2
emissions.”31
After the deployment of 2,100 Macs in Year-2,
a unified organisation offsets 270.9 MT of CO2
emission. Conclusions
Carbon Offset in C02e
In the Year-3, a unified organisation offsets 425.7 (1
MT CO2e = 1,000
In addition Kg CO2e)
to overall cost saving, Mac deployment
MT of CO2 emission after cumulative deployment of also helps organisations reduce their carbon footprint
3,300 Macs in three years. to an extent of 44% each device.
At the end of Year-4, after deploying cumulative 46% Organisations also save on energy costs as each Mac
of Macs, a unified organisation offsets 593.4 MT of requires 80% less energy on average than a PC.
CO2 emission. It may help organisations meet Environmental, Social
Each Mac requires 80% less energy on average than & Governance (ESG) and Net Zero goals as set by the
a PC. Macs are more energy efficient. regulators and the government.
For example, according to a recent report (2022), Wipro
PC1 275
171
425.7 MT
MacBook Air 13 M2
129 MT
Device Average CO2e
Apple 166 kg
Others 295 kg 1,000 2,100 3,300 4,600
Table 4: Average Carbon Footprint – MacBook Air 13 M1, MacBook Air Table 5: SKOCH Analysis of Average Carbon Offset on CO2e -
13 M2, PC1, PC2, PC3 are different configurations30 (Device CO2 in kg) Estimated deployment of Macs
© SKOCH 26
Key Findings
300 315
255 299 296
229
255
200 222 176 174
161
100
0
2017 2018 2019 2020 2021
Year
Table 6: Typical Carbon Emission Based on a Comparison of MacBook Air and PC Device 1 and PC Device 2 32
32. https://www.apple.com/environment/pdf/products/notebooks/13-inch_MacBookPro_PER_Nov2020.pdf
https://www.dell.com/en-au/dt/corporate/social-impact/advancing-sustainability/sustainable-products-and-services/product-carbon-footprints.
htm#scroll=off&tab0=1&pdfoverlay=//corporate.delltechnologies.com/asset/en-au/products/laptops-and-2-in-1s/technical-support/latitude-5320-
2-in-1-pcf-datasheet.pdf
https://h22235.www2.hp.com/hpinfo/globalcitizenship/environment/productdata/Countries/_MultiCountry/productcarbonfootprint_note-
bo_20214142527351.pdf
© SKOCH 27
Key Findings
Results
To account for these risks, the SKOCH CIO Agenda
Task Force adjusted this benefit downward by
15%, yielding a four-year, risk-adjusted total PV of
approximately $26.95 Cr ($3.23 Mn).
CXO, IT Industry
© SKOCH 28
Key Findings
Set Up Costs
Number of Macs
E1 1,000 1,100 1,200 1,300
Deployed
Subtotal: Total Cost of MDM and $60 Lakh $66 Lakh $72 Lakh $78 Lakh
E6 E1*E5
Additional Software ($72,002.88) ($79,203.16) ($86,403.45) ($93,603.74)
$32.45 Cr
Four Year Total
($3,894,238.99)
$26.95 Cr
Four Year Present Value
($3,235,174.43)
© SKOCH 29
© SKOCH