Why MTTR Is the Only Security Metric That Compounds
Coverage doesn't compound. Tool counts and detection rate don't either. You add to them, you congratulate the team, and the operational load stays exactly where it was.
There is one security metric that does compound, and most security organizations either under-measure it or measure it wrong. The metric is MTTR.
The next budget cycle will turn on whether your team can drive it down across every asset type at once.
The metrics that don't compound
Most security programs report up to a board on stock metrics. Coverage. Tool counts. Detection rate. Mean time to detect. Each of those is a snapshot. You buy more, you have more, and next year you do it again.
Mean time to detect has been investable for a decade and is now mostly a solved problem at enterprise scale. EDR, XDR, SIEM, CSPM, ITDR, CIEM, DSPM. Every category that absorbed real security spend got better at seeing things, and they all got better roughly together. The marginal value of one more detection tool today is small.
These metrics are stock-shaped. They go up and they stay up. Adding more doesn't multiply what's already there. It just nudges the level.
Why MTTR is different
MTTR, by which I mean *mean time to remediate* and not the incident-response use of the term, is a flow metric. It measures how long an exposed asset stays exposed before it is actually fixed. That makes it behave very differently from a stock metric.
It compounds in two directions.
The first is operational. Every issue that closes faster frees the team to take on the next one. Lower MTTR shrinks backlog, smaller backlog frees capacity, and freed capacity drives MTTR lower again. The math runs the other way too. A team buried in a six-month backlog cannot improve its MTTR no matter how much detection signal you give it. Once the number starts dropping, the system works with you. Once it climbs, it works against you.
The second is risk. Every day a vulnerable asset stays open is a day of exposure. If MTTR drops by 10x, the exposure window per issue drops by 10x across every issue your team handles. That is real enough risk reduction that boards eventually start asking about it.
This is why MTTR is the security metric that compounds. It is the one whose improvement creates more improvement.
Why per-asset MTTR plateaus
Most organizations that take MTTR seriously optimize it inside a single asset class. The identity team works on identity MTTR. The cloud team works on cloud MTTR. The data team works on data MTTR. Each one runs its own playbooks, makes its own progress, and reports its own number.
The org-level number barely moves.
There are two reasons. First, the average across asset types is dragged by the slowest class. A team that gets dormant account cleanup down from 90 days to 30 still looks bad in aggregate if certificate lifecycle sits at 60 days and data exposure sits at 90. The single-class wins are real and invisible.
Second, and more important, the highest-risk issues are cross-class. A service account that touches identity, cloud, and a data store is everyone's problem, which means it is nobody's problem. The slowest team's MTTR sets the actual time to remediate the issue that matters most. Per-asset optimization plateaus because the work that matters is not single-asset.
What compounds: horizontal remediation across every asset type
The only way to drive MTTR down meaningfully at enterprise scale is to do it across every asset type at once, on a single operational layer.
That layer needs two things. It needs to see across every place where security hygiene problems live, including identity, cloud, data, certificates, IT, HR, and non-human identities. And it needs to act on what it sees with the judgment a senior practitioner would apply. Visibility on its own is not enough, and routing the work to a human is not enough either. The next layer combines them.
It looks like this in practice. Cross-system context maps who owns what, what depends on what, and what risk is currently open. Specialized AI agents take that context and execute remediation end-to-end, with human approval at every step. The same layer handles a dormant identity account, an expired certificate, an over-permissive cloud role, and an exposed data share. It does not matter which team's playbook each one falls under. The MTTR is on the layer, not on the team.
This is what I mean when I say agentic security operations.
At Surf AI we call the context piece the Context Graph. It provides a real-time, cross-system view of ownership, dependency, and risk across identity, cloud, HR, data, certificates, and IT. That is the input the agents need to act safely across every asset type at once, rather than one class at a time.
How to ask for this in the next budget cycle
The question to put to vendors is no longer "what do you detect." Detection is mostly solved. The questions that matter in 2026 are different:
- What MTTR do you commit to, and across which asset types?
- How does the remediation loop close end-to-end?
- Where does the ownership and dependency context come from?
- How is every action approved and how is it logged?
The question to put to your own team is no longer "how fast do we detect." It is how fast you close, across every asset class, and what it would take to get all of them moving in the same direction at the same time.
The teams that get serious about MTTR, across every asset type and on a single layer, will compound. Everyone else will buy more dashboards.
Yair Grindlinger is the CEO and Co-Founder of Surf AI, a serial entrepreneur with over two decades in cybersecurity and the former SVP of Cloud Strategy at Proofpoint.
