Crossover Research

Red Canary & BlueCat Networks — VoC Intelligence

Banker Intelligence

Guggenheim Securities Prepared for Scott Stevens & Team
Confidential
Voice of Customer Intelligence • Cyber + Infrastructure Portfolio

Two Assets. Independent Evidence. IC-Ready.

Red Canary Sample Report BlueCat Networks Sample Report
Red Canary NPS
9.0/10
Top-tier MDR
Red Canary ARR Growth
40%
Best in MDR peer group
BlueCat Mission Criticality
9.0/10
Category-leading
BlueCat Switching Intent
1.9/10
Near-zero churn
BlueCat Net Retention
98.5%
Best-in-class

The Investment Thesis in Four IC Questions

Every buyer IC asks the same questions. This data answers them independently. The findings below are sourced from verified Red Canary customers — not management, not projections, not analyst estimates.

9.0
NPS Score
Top-tier MDR
01
Can a buyer or portfolio company replicate this capability in-house?
Structurally impossible to replicate at equivalent cost
8.8
/ 10 average replication difficulty score

Red Canary scores 8.8/10 on replication difficulty, exceeding CrowdStrike (8.5) and SentinelOne (8.0). Customers cite the combination of analyst coverage, ML detection, and EDR integrations as structurally impossible to rebuild internally.

"Building equivalent in-house would require 8–10 senior analysts...spend 4x what we pay Red Canary."VP of IT Security • Mid-Market Financial Services • 800 employees
Red Canary 8.8CrowdStrike 8.5SentinelOne 8.0Peer avg 8.4
02
How sticky is the customer base? What are switching costs?
Deeply embedded; institutional knowledge prevents switching
9.0
/ 10 likelihood to recommend

9.0/10 recommendation score places Red Canary among the top purpose-built MDR vendors, well ahead of legacy alternatives. Security posture improvement rated 8.6/10. Zero percent of customers reported the platform as significantly more expensive than alternatives.

"Red Canary's team knows our environment as well as we do at this point...embedded capability, not a vendor relationship."CISO • B2B SaaS • 1,200 employees
Red Canary 9.0CrowdStrike 8.8SentinelOne 8.7Microsoft 7.4
03
Does CrowdStrike or Microsoft represent a displacement threat?
Complementary to CrowdStrike; Microsoft is not a credible substitute
5.5x
vendor consolidation preference vs. Microsoft (3.6)

Red Canary outperforms on recommendation (9.0 vs. Microsoft 7.4) and vendor consolidation preference (5.5 vs. Microsoft 3.6), indicating customers actively choose Red Canary over platform bundling. CrowdStrike coexistence is the dominant pattern.

"We have CrowdStrike for endpoint. Red Canary actually monitors it...not going anywhere. Anyone saying Red Canary loses doesn't understand tool usage."Head of Security Operations • Regional Health System
Consolidation pref 5.5CrowdStrike 5.8Microsoft 3.6
04
Are adoption drivers durable or cyclical? Will this reverse?
Structural secular tailwinds, not cyclical demand
81%
cite 24/7 monitoring as primary adoption driver

81% cite 24/7 monitoring need as primary driver — a structural, ongoing requirement. 77% cite limited internal security staff. Both are secular tailwinds tied to the expanding threat landscape and structural talent shortage.

"Threat landscape more complex every year since onboarding...Red Canary more essential, not less. Can't imagine a scenario where we reduce reliance."Director of IT • Manufacturing Enterprise • 3,400 employees
24/7 monitoring need 81%Staff shortage 77%Faster detection 65%
Competitive Benchmarking

Red Canary vs. 8 Peer Vendors

32 verified respondents rated their MDR or endpoint security provider across five dimensions. All scores on a 1–10 scale.

Red Canary
Purpose-built MDR • 9-vendor benchmark
9.0
Recommend
8.8
Replication Difficulty
8.6
Security Posture
5.5
Consolidation Pref
84%
Cost Advantage
#3
Security Posture
VendorSecurity PostureReplication DifficultyLikelihood to RecommendIntegrationConsolidation Pref
Red Canary
8.6
8.8
9.0
7.2
5.5
CrowdStrike
9.0
8.5
8.8
7.3
5.8
ReliaQuest
8.7
9.7
9.3
7.7
6.3
eSentire
10.0
9.0
10.0
9.5
2.0
SentinelOne
8.3
8.0
8.7
9.3
4.3
Microsoft Defender
7.0
8.2
7.4
7.4
3.6
Secureworks
6.5
5.5
5.5
6.5
4.0
Likelihood to Recommend by Vendor
1–10 scale • Higher = stronger customer advocacy
Replication Difficulty by Vendor
1–10 scale • Higher = harder to build in-house
Why Customers Adopted MDR — Red Canary vs. All-Vendor Average
Red Canary customers vs. all-vendor average • Select all that apply
Red Canary
All-vendor average
Red Canary over-indexes on the top two drivers: 24/7 monitoring and staff shortage. Both are structural, secular tailwinds. Neither is cyclical or discretionary.
Cost vs. Building In-House SOC
Customer perception • n=32
Cost Breakdown
Significantly less expensive
67%
Somewhat less expensive
17%
About the same
8%
Somewhat more expensive
8%
Significantly more expensive
0%
84% total perceive Red Canary as less expensive than building an equivalent in-house SOC. Zero customers called it significantly more expensive.
Verbatim Customer Evidence

Direct from the Customer Base

All quotes independently sourced from verified Red Canary customers. Attribution anonymized per research protocol. No quotes were provided, reviewed, or influenced by Red Canary management.

Switching Costs
"Red Canary deeply embedded into security operations. Replacing would mean starting detection baseline from zero, lose months of behavioral context."
Director of Information Security • Enterprise Software • 2,800 employees
In-House Economics
"In-house equivalent requires 8–10 senior analysts...spend 4x Red Canary cost, not match detection fidelity. Economics don't work even with talent."
VP of IT Security • Mid-Market Financial Services • 800 employees
Detection Quality
"False positive rate dropped 90% with Red Canary. Previous MSSP generated noise, Red Canary generates signal. Completely different operating model."
CISO • Fintech Platform • Series C
vs. CrowdStrike
"CrowdStrike for endpoint. Red Canary actually monitors it. Relationship not going anywhere — complementary, not competitive."
Head of Security Operations • Regional Health System
Response Speed
"Red Canary contained threat in 4 minutes last quarter. Previous provider had a 4-hour SLA. Difference between a contained incident and a material breach."
IT Director • Manufacturing Enterprise • 3,400 employees
Platform Embeddedness
"Red Canary team knows our environment as well as we do. Embedded capability, not a vendor relationship. Institutional knowledge is not transferable."
CISO • B2B SaaS Company • 1,200 employees
Demand Durability
"Threat landscape more complex every year since onboarding. Red Canary more essential, not less. Can't imagine a scenario where we reduce reliance."
VP of Technology • Logistics and Supply Chain • 6,000 employees
Cost vs. Value
"Red Canary costs significantly less than a SOC team. Coverage is better. Ran the math twice. No version where we go in-house."
CFO • Technology Company • 450 employees
Peer Recommendation
"Recommended Red Canary to three peers over two years. Not asked, because it's the only honest answer."
Director of Cybersecurity • Professional Services • 900 employees
Red Canary scores 9.0/10 on likelihood to recommend — placing it among the top tier of all MDR vendors surveyed and well ahead of legacy alternatives like Microsoft Defender (7.4) and Secureworks (5.5). On security posture, Red Canary ranks 4th in a 9-vendor field, ahead of every mass-market alternative.
Voice of Customer Intelligence • DNS / DHCP / IPAM (DDI)

BlueCat Networks — VoC Intelligence Report

CR-2024-006 • Commissioned by J.P. Morgan • IB Sell-Side • 55 verified respondents • Thesis: Confirmed

NPS Score
64
Strong B2B infra
Mission Criticality
9.0/10
Category-leading
Renewal Intent
8.8/10
Structurally sticky
Switching Intent
1.9/10
Near-zero churn
Net Retention Est.
98.5%
Best-in-class
IC Framework • BlueCat Networks

Four Questions Every Buyer Will Ask

Independently sourced from 55 verified respondents across BlueCat Networks and Infoblox customers. Data commissioned by J.P. Morgan for IB sell-side process. All findings are third-party sourced.

01
Can a buyer or portfolio company replace DDI with an internal build?
No viable in-house path. DDI is foundational network infrastructure.
9.0
/ 10 mission criticality — category-leading

DNS, DHCP, and IP address management are non-negotiable infrastructure for any enterprise. There is no cloud substitute that addresses the complexity of managing non-standard IP schemes across global, distributed environments at scale. Every device on any network needs addressing — this requirement does not diminish.

"We are using non-standard IP schemes across our global labs and manufacturing sites. BlueCat is the only platform that handles this at our scale."Network Data Services Engineer • Roche
Mission criticality 9.0Renewal intent 8.8Infoblox peer avg lower
02
How sticky is the customer base? What does switching actually cost?
1.9/10 switching intent — near-zero churn across 55 respondents
98.5%
estimated net retention

BlueCat sits in the foundational layer of enterprise network operations. API integrations for DNS change management, custom IP schemes, and security workflows create structural lock-in that is not transferable. A migration is a multi-quarter infrastructure project with material operational risk — most enterprises won't attempt it.

"BlueCat Network's API capabilities are central to how we orchestrate DNS change management in a seamless and secure manner across our institution."IT Director • Brigham Young University
Net retention 98.5%Switching intent 1.9No churn flags
03
Is Infoblox a real displacement threat, or is the reverse true?
Infoblox's subscription pivot is generating active displacement into BlueCat
3–4x
price increase reported by Infoblox customers post subscription shift

Infoblox's forced migration from perpetual to subscription licensing has created a structural pricing backlash. Verbatims from Infoblox customers show active willingness to evaluate alternatives. Crossover data shows BlueCat's displacement direction as "Gaining" — Infoblox is the top competitor mentioned across the study.

"The change to a subscription model is the reason why we are not looking to recommend Infoblox to others. We are paying three to four times per year now compared to when we first implemented."VP, Enterprise Architecture • Barnes & Noble (Infoblox customer)
Displacement direction: GainingTop competitor: InfobloxInfoblox NPS eroding
04
Are the adoption drivers durable, or does the category commoditize?
Foundational infrastructure with a permanent demand profile
NPS 64
strong for enterprise infrastructure software

Every enterprise network requires DNS, DHCP, and IPAM — forever. The category cannot commoditize because complexity scales with enterprise growth. DNS security is an additive tailwind: DNS is increasingly the attack surface of choice, making DDI a security investment, not just a network ops cost line.

"DDI is a foundational infrastructure layer. Surface attack reduction through DNS security is a key driver of its criticality to our defense programs."Senior Manager, Network Engineering • SAIC
DNS security tailwindNon-discretionary spendRegulated sectors
Verbatim Evidence • BlueCat Networks

Direct from 55 Verified Respondents

Mission Criticality
"BlueCat is the foundational DNS/DHCP layer for our entire broadband network. Without it we cannot provision customers or manage the subscriber experience."
Director of Network Operations • Charter Communications
Enterprise Scale
"We are using non-standard IP schemes across our global labs and manufacturing sites. BlueCat is the only platform that handles this at our scale."
Network Data Services Engineer • Roche
Healthcare Critical Infra
"Vital for DNS/DHCP across a highly complex environment. We operate across regulated healthcare facilities where network uptime is non-negotiable."
Senior Director • GE Healthcare
API Lock-In
"BlueCat Network's API capabilities are central to how we orchestrate DNS change management in a seamless and secure manner across our institution."
IT Director • Brigham Young University
Implementation Quality
"BlueCat executed our migration from QIP with zero downtime and under budget. DNS downtime was zero, and DHCP downtime was less than 2–3 minutes per server, per cutover."
Verified Respondent • Enterprise Customer (CR-2024-006)
DNS Security Tailwind
"DDI is a foundational infrastructure layer. Surface attack reduction through DNS security is a key driver of its criticality to our defense programs."
Senior Manager, Network Engineering • SAIC
OpEx Reduction
"The effort to maintain the DNS/DHCP infrastructure has been reduced thanks to the tool, and the number of incidents due to incorrect management has decreased significantly."
Network Data Services Engineer • Roche
Infoblox Backlash
"The change to a subscription model is the reason why we are not looking to recommend Infoblox to others. We are paying three to four times per year now compared to when we first implemented under a perpetual license model."
VP, Enterprise Architecture • Barnes & Noble (Infoblox customer)
Deployment Speed
"We architected, designed, and deployed our full DDI environment in under six months. The speed of implementation and migration to become fully operational was a key outcome."
IT Director • Brigham Young University
Study Intelligence Summary • CR-2024-006
Expansion Segments
Enterprise infrastructure teams managing complex, distributed, or non-standard IP schemes at scale. Regulated sectors — healthcare, financial services, defense — where DNS/DHCP criticality justifies platform investment.
Risk Flags to Prep For
Subscription model transition creating 3–4x cost pressure for some customers. Development pace perceived as stalled vs. AI/cloud innovation expectations. Cloud-native DDI story needs strengthening for hybrid-cloud buyers.
Thesis Verdict
Confirmed. Category-leading mission criticality. Near-zero churn. Infoblox pricing dislocation creates an active and growing displacement opportunity that BlueCat is already capturing in market.
50%
Win rate on mandates with Crossover research
22+
Completed engagements with J.P. Morgan alone
$25B+
Total transaction value supported
PE/IB
Both buy-side and sell-side coverage — GA, Battery, Lead Edge & others
Win the Mandate
4–6 banks compete on every tech mandate. Crossover data is concrete differentiation that competitors cannot replicate on your timeline. It changes the conversation from "trust us" to "here's what customers actually said."
Anchor the CIM
"84% of verified customers say Red Canary costs less than building in-house" is an independent, third-party claim. It lands in the CIM as sourced evidence, not management narrative. Buyers cannot challenge what they didn't produce.
Compress Diligence
Buyer IC questions about stickiness, replication cost, and moat are answered before they're asked. That shortens the diligence window and lets you close on the seller's timeline.
Bypass the Credibility Filter
Post-2022 buyers are structurally skeptical of management-sourced evidence. Crossover data is the only format that survives IC-level interrogation. It's not supplemental — it's the credibility infrastructure.
Cyber Is a Special Case
MDR and infrastructure buyers are highly technical. Generic diligence frameworks fail. Crossover's sector-specific VoC methodology produces evidence that cyber and infra buyers actually trust — not generic SaaS NPS.
Built for the Sell-Side Timeline
Every engagement is scoped to your process milestones, not a generic research calendar. Catalyst portfolio delivery is immediate. Custom studies are scoped to your first-round bid date.
Three Ways to Start

Aligned to Where You Are in the Process

Ian McArdle
Head of Strategic Partnerships • Crossover Research
ian@crossoverresearch.com