Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
By organisation size

Zero trust cost for 10,000+ employees: $8M to $20M+ year one

A 10,000+ employee large enterprise runs zero trust at a scale where the operating model matters more than any single implementation decision. This page sizes the budget pillar-by-pillar, walks through the in-house build economics that start to win at this scale, the regulated-industry premium, the multi-region overhead, and the operating-model shift that separates successful large-enterprise zero trust programmes from the ones that stall under leadership change.

Pillar budget

Year-one cost by pillar at 10,000+ users

Representative pillar allocation for a 10,000 to 25,000-employee large enterprise pursuing CISA Advanced-tier maturity in year three with Optimal tier as a continuous-improvement target.

PillarShareYear 1 costComponentsServices
Identity (full fabric, multi-region)20-28%$1.6M - $5.6MMulti-region IdP P2, full PAM, full IGA at scale, identity fabric, workload identity in production, machine identity programme$500K - $1.6M
Network20-28%$1.6M - $5.6MSSE platform or multi-vendor, microsegmentation at full scale, NDR, browser isolation across estate$400K - $1.4M
Device8-12%$640K - $2.4MMDM/UEM enterprise multi-region, EDR for workstations and servers, MTD full, posture, BYOD at scale$160K - $480K
Applications10-15%$800K - $3.0MCNAPP enterprise, API security at scale, service mesh production, full DAST/SAST/SCA in CI/CD$200K - $700K
Data10-15%$800K - $3.0MDLP full multi-channel, classification at scale, DSPM, tokenisation, HSM-backed KMS, encryption-in-use for sensitive workloads$200K - $700K
Security team (in-house)Across$4.0M - $10M15-40 FTE: architects, engineers, GRC, IR specialists, SOC (in-house or hybrid)Internal
Regional + integration overhead10-15%$800K - $3.0MMulti-region infrastructure, tool-to-tool integration at scale, end-user enablementMixed
In-house economics

Where build starts to win at this scale

Around 10,000 to 15,000 users, in-house build starts to genuinely compete with commercial on total cost of ownership for specific pillars. The economics shift because per-user commercial licensing accumulates to material dollar amounts at this scale, while in-house operational cost (platform engineering team) scales sub-linearly with user count. A 25,000-user organisation paying $20 per user per month for full zero trust commercial licensing is spending $6M per year on licensing alone, plus enterprise integration and services. In-house at this scale, for the pillars where it is feasible, needs 5 to 8 platform engineers ($750K to $1.6M loaded) plus $200K to $500K in infrastructure, totalling $1.0M to $2.1M per year. The saving on a full-stack basis is $4M to $5M per year, which justifies the in-house operational investment.

The honest answer about which pillars work in-house at this scale: identity (with Keycloak or Authentik) for workforce identity is viable but operationally heavy; most large enterprises stay commercial here due to lock-in and switching cost concerns. Workload identity (SPIFFE / SPIRE) is mature in-house and increasingly the default. Policy Engine (Open Policy Agent) is mature in-house and used by major large enterprises. Secrets vault (HashiCorp Vault open source) is viable for non-customer-facing service accounts. ZTNA (OpenZiti, HashiCorp Boundary) is technically viable but operationally expensive; most stay commercial. EDR is almost never in-house because detection efficacy is highly vendor-differentiated. DLP is almost never in-house because the open-source coverage gap is significant.

The dominant pattern at 10,000+ users is hybrid: commercial for the high-differentiation pillars (identity, ZTNA, EDR, DLP), in-house or open-source for the lower-differentiation pillars (workload identity, Policy Engine, secrets vault for non-customer-facing services, basic SIEM components). This pattern saves $2M to $4M per year compared to pure commercial without the operational complexity of pure in-house. The in-house-vs-vendor-cost pagehas the full pillar-by-pillar comparison.

Regulated premium

The 30-60% cost uplift for regulated large enterprises

Financial services, healthcare, and federal contractor large enterprises at 10,000+ users typically pay 30 to 60 percent more than non-regulated equivalents for zero trust at the same user count. The drivers are predictable.

Higher license tiers. Regulated industries need higher identity tiers (P2 versus P1 for risk-based MFA and privileged identity management), higher EDR tiers (managed response, advanced threat hunting), and higher data-pillar coverage (full DLP rather than email-only, full classification rather than top-tier only). The per-user license uplift is roughly 25 to 40 percent versus non-regulated. Pillars that non-regulated organisations defer become mandatory. Full data pillar (DLP across email, web, endpoint, cloud, removable media), full microsegmentation (not just pilot), full IGA (not just access reviews) are required for regulated industries from Phase 1, not deferred to Phase 3. Compliance-grade evidence and audit trails. Regulated industries need tooling to produce audit-ready evidence on demand: SIEM with long-tail retention, IGA with attestation tracking, PAM with full session recording. Each evidence requirement adds tooling cost. Dedicated GRC headcount. Three to eight compliance and GRC specialists at $150K to $250K loaded each adds $450K to $2.0M annually in headcount cost not present in non-regulated equivalents.

The premium is real and largely unavoidable in regulated industries. The fix is not to avoid the premium but to budget for it accurately from the start. Regulated large enterprises that try to budget zero trust at non-regulated rates typically discover the premium in audit-driven scope expansion partway through implementation, which is more expensive than budgeting accurately from the start.

Multi-region

The 20-40% overhead from multi-region operations

Most 10,000+ user enterprises operate in multiple regions: at minimum a primary region plus EU operations subject to GDPR. Some operate in five to ten regions globally. Multi-region zero trust operations add 20 to 40 percent to infrastructure cost compared to single-region equivalents.

The drivers are multi-region IdP deployment (Entra ID multi-region tenancy, Okta org-per-region for data residency, or a federation architecture across multiple regional IdPs), multi-region SIEM with log routing(logs from each region routed to a regional SIEM instance to satisfy data-residency requirements, with summary data flowing to a global SOC view), multi-region MDR coverage following the sun (24x7 coverage delivered from regional analyst teams rather than a single SOC), region-specific ZTNA gateways for latency (users routed to the nearest ZTNA gateway rather than backhauled to a central one), and compliance overhead for each region (GDPR plus UK plus Canada plus Australia plus Brazil, each with their own data-protection and breach-notification requirements).

Most large enterprises absorb multi-region cost as a regional-operations line rather than a pure security line, which understates the true cost of zero trust at this scale. Realistic budgeting includes the multi-region overhead in the zero trust line item.

Operating model

The dominant success factor at large enterprise scale

The most important shift at 10,000+ users is treating zero trust as a continuous operating model rather than a one-time programme. The large enterprise that scopes zero trust as a four-year programme with a defined end date typically finds the implementation outlives the original sponsors (CISO turnover at large enterprises averages two to three years; executive sponsorship changes; business reorganisation; mergers and acquisitions), and the programme either loses momentum and stalls or gets reinvented under new leadership with significant lost continuity.

The fix is to embed zero trust as an ongoing security operating model with sustained funding, dedicated headcount, and continuous-improvement governance. Specifically: the zero trust architect roles become permanent positions in the security organisation rather than fixed-term programme hires. The platform-engineering function that runs the security infrastructure becomes a permanent capability. The governance forum that makes zero trust decisions becomes a standing committee with rotating business-unit representation. Annual maturity assessments measure progress against CISA tiers and feed back into the next year's investment plan. Programmes structured this way survive leadership change; programmes structured as one-time deliveries often do not.

The cost implication of the operating-model framing is that the year-one number is no longer a hump cost followed by lower ongoing; it is the start of a sustained $5M to $15M+ annual run rate that the organisation commits to indefinitely. For most 10,000+ user enterprises, this is the right framing both because it matches the reality of the work and because it produces better security outcomes than the programme framing.

Cross-links

Related cost references

Frequently asked

10,000+ user zero trust cost questions

How much does zero trust cost for a 10,000+ employee large enterprise?
Year-one total cost ranges from $8M to $20M+ depending on path, regulatory profile, and complexity. The lower bound represents 10,000-user organisations on Microsoft-bundled-leaning paths with single-region operations. The upper bound represents 25,000 to 50,000-user organisations on best-of-breed multi-vendor stacks in heavily regulated industries (financial services, healthcare, federal contractors) with multi-region operations. Ongoing annual cost in steady state is roughly $3M to $7M+, which is 35 to 45 percent of year-one cost. Per-user per-month cost is the lowest in the cohort at $50 to $150 due to volume discount and infrastructure scaling.
When does in-house build start to win on cost at this scale?
Around 10,000 to 15,000 users, in-house build starts to genuinely compete with commercial on total cost of ownership for specific pillars. A 25,000-user organisation paying $20 per user per month for full zero trust commercial licensing is spending $6M per year on licensing alone, plus enterprise integration and services. In-house at this scale needs 5 to 8 platform engineers ($750K to $1.6M loaded) plus $200K to $500K in infrastructure, totalling $1.0M to $2.1M per year for the pillars where in-house is viable. The saving is meaningful enough to justify the operational investment. Most large enterprises use hybrid: commercial for high-differentiation pillars (identity, ZTNA, EDR), in-house or open-source for lower-differentiation pillars (workload identity, Policy Engine, secrets vault for non-customer-facing services).
How big is the security team at 10,000+ users?
Typically 15 to 40 in-house security people across architecture, engineering, operations, GRC, and incident response. Three to five security architects (different specialisations: identity, network, applications, data, programme). Eight to fifteen security engineers (tool-specific deep specialisation, often two to three engineers per major platform). Three to eight GRC and compliance specialists (audit liaison, policy authoring, regulatory). Two to five incident response specialists. Plus the SOC, which may be in-house (typically 15-30 analysts) or hybrid with MDR. Total in-house security headcount cost: $4M to $10M loaded annually for a well-staffed large-enterprise security organisation.
What does multi-region zero trust add to cost?
Multi-region operations (typical for 10,000+ user enterprises) add 20 to 40 percent to zero trust infrastructure cost. The drivers are multi-region IdP deployment (Entra ID multi-region, Okta org-per-region for data residency), multi-region SIEM with log routing, multi-region MDR coverage following the sun, region-specific ZTNA gateways for latency, and the compliance overhead of meeting data-residency requirements in each region (EU GDPR, UK, Canada, Australia, Brazil). The cost adds up; most large enterprises absorb it as a regional-operations line rather than a pure security line.
What is the regulated-industry premium at this scale?
Financial services, healthcare, and federal contractors at 10,000+ users typically pay 30 to 60 percent more than non-regulated equivalents for zero trust at the same user count. The drivers are higher per-user license tiers (P2 versus P1, enterprise versus business), full coverage of pillars that non-regulated organisations defer (full data pillar, full microsegmentation, full IGA), compliance-grade evidence and audit trails (which add tooling cost), and dedicated GRC headcount. For a 10,000-user financial services firm, year-one zero trust budget runs $12M to $24M; for a non-regulated equivalent, $8M to $14M.
How long does zero trust take at 10,000+ users?
Four to seven years for CISA Optimal-tier maturity. Phase 1 (foundation) is 12 to 24 months due to coordination across business units, regions, and acquisitions. Phase 2 (expansion) is 18 to 36 months and overlaps with Phase 1. Phase 3 (optimisation) is 24 to 48 months. Most large enterprises reach CISA Advanced tier by year three to four and Optimal tier by year five to seven, on a continuous-improvement basis rather than a fixed end date. The timeline is driven by organisational change capacity and acquisition cadence, not by technical implementation pace.
What is the most common 10,000+ user zero trust mistake?
Treating zero trust as a one-time programme rather than a continuous operating model. The large enterprise that scopes zero trust as a four-year programme with a defined end date typically finds the implementation outlives the original sponsors (CISO turnover, executive sponsorship changes, business reorganisation), and the programme either loses momentum and stalls or gets reinvented under new leadership with significant lost continuity. The fix is to embed zero trust as an ongoing security operating model with sustained funding, dedicated headcount, and continuous-improvement governance, rather than a one-time programme with a defined start and end. Programmes structured as operating models survive leadership change; programmes structured as one-time deliveries often do not.