Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
By organisation size

Zero trust cost for 1,000 employees: $1.5M to $3M year one

A 1,000-employee upper mid-market organisation is where zero trust crosses from product-led to programme-led. Identity fabric becomes mandatory, PAM and IGA enter scope, a dedicated security team replaces part-time ownership, and managed detection and response handles SOC coverage. This page sizes the budget pillar-by-pillar and names the three transitions that make this scale different from 500 users.

Pillar budget

Year-one cost by pillar at 1,000 users

Representative pillar allocation for a 1,000-employee upper mid-market organisation pursuing CISA Initial-to-Advanced maturity in year one.

PillarShareYear 1 costComponentsServices
Identity (fabric)25-35%$450K - $1.0MCloud IdP P2, PAM, IGA, identity-aware proxy, secrets vault, workload identity starting$120K - $350K
Network20-30%$350K - $850KZTNA, SWG, DNS, microsegmentation pilot, browser isolation$80K - $280K
Device12-18%$250K - $560KMDM/UEM, EDR P2, MTD, posture management, BYOD coverage$45K - $130K
Applications10-15%$200K - $500KCNAPP, API security platform, container runtime, basic service mesh$30K - $90K
Data10-15%$200K - $500KDLP full coverage, classification, DSPM, tokenisation if regulated$30K - $90K
Security architect + opsAcross$350K - $600K1 architect, 1-2 engineers, plus MDR contract for SOCInternal + MDR
PMO + change mgmtAcross$120K - $300KProgramme management, comms, training, business-unit liaisonExternal + internal
Transition 1

Why identity fabric replaces single IdP at this scale

At 500 users a single identity provider can serve most use cases adequately. At 1,000 users the architecture starts to creak. The legacy-application population (apps that do not speak SAML or OIDC) is typically large enough at 1,000 users that point fixes do not scale; you need a coherent identity-aware proxy strategy spanning multiple apps. The service-account population typically exceeds 300 to 500 accounts, which is past the practical limit for manual management and forces secrets-vault adoption. The workforce-identity-store complexity grows: most 1,000-user organisations have at least two HR systems of record (legacy plus current), multiple Active Directory forests, and federated cloud identity, which a single IdP cannot serve coherently.

The identity-fabric approach addresses this complexity. The fabric stitches together cloud IdP, on-premise AD, identity-aware proxies for legacy apps, secrets vaults for service accounts, PAM for privileged human accounts, IGA for lifecycle and access review, and workload identity for cloud-native. The full fabric runs $450K to $1.0M in year-one cost at this scale, which is the biggest single line in the 1,000-user zero trust budget. The deep dive on architecture and component cost lives on the identity-fabric-cost page.

Organisations that try to stay on a single-IdP architecture past 1,000 users typically hit a wall at 1,500 to 2,500 users when the legacy-app and service-account problems become acute enough to force the fabric transition under time pressure, which costs materially more than planning the transition deliberately at 1,000 users.

Transition 2

PAM and IGA become unavoidable

At 500 users PAM and IGA are often deferred to year two or three. At 1,000 users they are typically Phase 1 or early-Phase-2 requirements. The privileged-account population at 1,000 users is roughly 120 to 250 accounts (10 to 25 percent of workforce depending on technical density). Manual privileged-account management at this scale is not viable: privileged access reviews alone consume two to four hours per week of senior engineer time, and the audit evidence trail is incomplete. PAM platforms (CyberArk, BeyondTrust, Delinea) automate session recording, just-in-time elevation, password rotation, and audit evidence generation. Cost: $20K to $120K per year in licensing plus $200K to $600K in implementation services for a typical 120-day rollout.

IGA becomes unavoidable for two reasons. First, the access-review workload at 1,000 users is unmanageable manually; SOC 2 and ISO 27001 audits expect quarterly reviews with demonstrable evidence trails, and at 1,000 users plus 50 to 150 applications, the review matrix is too large for spreadsheets. Second, joiner-mover-leaver volume reaches 200 to 500 events per year (roughly 25 percent annual turnover plus internal moves), each of which touches HR, ITSM and dozens of connected applications. IGA platforms (SailPoint, Saviynt, Microsoft Entra Identity Governance) automate the lifecycle and produce audit-ready evidence. Cost: $80K to $300K per year in licensing plus $150K to $400K in implementation services.

PAM and IGA together add $300K to $1.0M to year-one zero trust cost over the 500-user baseline. The cost is real; the alternative (manual privileged-access and lifecycle management at this scale) is more expensive in operational time and audit risk than the platform investment.

Transition 3

The security team grows beyond a single architect

At 500 users a single security architect plus part-time engineering allocation can run the programme. At 1,000 users the team needs to grow. The dominant pattern is one architect (programme ownership, architecture decisions, vendor management), one to two security engineers (tool deployment, integration, policy authoring, day-to-day operations), and managed detection and response for 24x7 SOC coverage. Total cost: $350K to $600K per year for the in-house headcount plus $250K to $600K per year for MDR.

In-house SOC at this scale is rarely cost-justified. A 24x7 in-house SOC needs 6 to 10 analysts (three shifts plus overlap), which runs $700K to $1.5M loaded annually. MDR providers (Arctic Wolf, Expel, Red Canary, eSentire, CrowdStrike Falcon Complete, SentinelOne Vigilance) offer equivalent or better coverage for $250K to $600K at this scale. mdrcost.com has deeper MDR pricing. The hybrid pattern (MDR for tier-1 and tier-2, in-house for tier-3 incident response and threat hunting) is increasingly common and combines the cost advantage of MDR with the institutional knowledge of in-house.

Common mistake

Hiring the security architect role too late

The most common zero trust mistake at 1,000 users is starting the programme without a dedicated security architect, on the assumption that the IT director can absorb the responsibility while running everything else. The IT director cannot, for straightforward reasons of bandwidth and specialisation. Zero trust architecture decisions (which IdP, which ZTNA, which EDR, PAM rollout sequence, microsegmentation timing, data-pillar deferral or acceleration) require dedicated focus and current subject-matter expertise. The IT director making these decisions in 20 percent of their time typically gets six to twelve months into the programme before realising the decisions need re-doing, at which point the cost has been incurred and the timeline has slipped.

The fix is straightforward: hire the security architect before starting the programme, accept the three to six month hiring timeline, and use that time for stakeholder alignment and procurement preparation rather than premature vendor selection. The architect-first pattern adds three to six months to programme start but typically delivers Phase 1 capabilities six to twelve months earlier than the architect-late pattern because Phase 1 decisions are made once rather than twice.

Cross-links

Related cost references

Frequently asked

1,000-user zero trust cost questions

How much does zero trust cost for a 1,000-employee organisation?
Year-one total cost ranges from $1.5M to $3M depending on path and starting position. The Microsoft-bundled path lands at the lower bound, roughly $1.5M to $2.0M. A best-of-breed multi-vendor path lands at the upper bound, $2.4M to $3.0M. Ongoing annual cost in steady state is roughly $800K to $1.4M, which is 50 to 55 percent of year-one cost. The 1,000-user scale is where many organisations cross from product-led to programme-led zero trust, requiring dedicated programme management, dedicated security architects, and explicit phasing discipline.
Why does identity fabric become mandatory at 1,000 users?
Three reasons. First, the legacy-app population grows large enough that point fixes do not scale; you need a coherent identity-aware proxy strategy spanning multiple apps. Second, the service-account population typically exceeds 300 to 500 accounts, which exceeds the practical limit for manual management and forces secrets-vault adoption. Third, the workforce-identity-store complexity grows: most 1,000-user organisations have at least two HR systems of record (legacy plus current), multiple Active Directory forests, and federated cloud identity, which a single IdP cannot serve coherently. The /identity-fabric-cost page covers the architecture in detail.
Do we need a security operations centre at 1,000 users?
Yes, but rarely in-house. The dominant pattern at 1,000 users is managed detection and response (MDR) for 24x7 coverage, with one to two in-house security engineers handling triage, escalation, and tool tuning. In-house SOC at 1,000 users requires 6 to 10 analysts (24x7 coverage with overlap), which runs $700K to $1.5M loaded annually for headcount alone. MDR at this scale runs $250K to $600K per year for the equivalent coverage. The mdrcost.com sister site has deeper MDR pricing. Hybrid models (MDR for tier-1 plus in-house for tier-2 and tier-3) are increasingly common.
What does PAM rollout cost at 1,000 users?
PAM rollout at 1,000 users typically scopes 120 to 250 privileged accounts (10 to 25 percent of the workforce, depending on technical density). At list pricing for CyberArk, BeyondTrust or Delinea ($15 to $40 per privileged user per month), that is $22,000 to $120,000 per year in licensing. Implementation cost dominates year one: $200K to $600K for a typical 120-day rollout including privileged-account discovery, session-recording configuration, secrets-vault deployment, and just-in-time elevation workflow design. Most 1,000-user organisations under-budget the discovery phase; expect to find 30 to 60 percent more privileged accounts than initially scoped.
When does identity governance (IGA) become unavoidable?
Around 1,000 users, for two reasons. First, the access-review workload becomes unmanageable manually; SOC 2 and ISO 27001 audits expect quarterly reviews and demonstrable evidence trails, which is impractical to produce manually at this scale. Second, the joiner-mover-leaver volume reaches 200 to 500 events per year (roughly 25 percent annual turnover plus internal moves), each of which touches HR, ITSM and dozens of connected applications. IGA platforms (SailPoint, Saviynt, Microsoft Entra Identity Governance) automate the lifecycle and produce audit-ready evidence. Cost: $80K to $300K per year in licensing plus $150K to $400K in implementation services.
How many products do we end up with at 1,000 users?
Typically 12 to 18 distinct security products spanning the five pillars. Identity: IdP plus PAM plus IGA plus secrets vault. Device: MDM plus EDR plus MTD plus posture management. Network: ZTNA plus SWG plus DNS plus microsegmentation. Applications: CNAPP plus API gateway plus optionally service mesh. Data: DLP plus classification plus optionally tokenisation. Plus SIEM and SOAR for the security operations function. The product count itself is not the problem; integration completeness is. Mature programmes deploy fewer products more deeply rather than more products at shallow integration.
What is the most common 1,000-user zero trust mistake?
Hiring the security architect role too late. The 1,000-user organisation that starts a zero trust programme without a dedicated security architect, on the basis that the IT director can absorb the responsibility, typically takes nine to fifteen months to realise the IT director cannot, then hires the architect, then re-does six months of decisions made in the architect-less period. The lost time and re-work cost is $200K to $500K in a typical case. Hire the architect first, then start the programme.