CYBERSECURITY ASSESSMENT Objective: To have a better understand of your current security posture and it's challenges/loophole. Assessment Form Please help us to understand your challenges better by completing this assessment. It should take around 5 minutes to complete. Current Posture 1) Current number of Security Products in your environment? <2021-50>50 2) What are the pressing challenges with your current environment?I have trouble discovering my dataI have trouble securing my dataI have trouble securing my emailI have trouble securing my endpointsI have trouble securing my attack surfaceI have trouble securing my mobile applicationsI have trouble managing my cryptographic keysOthers: 3) Do you have an Incident Response team? YesNoUnsure 4) When was your last scheduled penetration test or security assessment? <6 months ago6-12 months ago>12 months agoOthers: 5) Are users able to make changes on the security systems installed on their workstations or devices? YesNoUnsure 6) Are users able to download and install software without admin assistance? YesNoUnsure 7) Are users able to alter operating system files? YesNoUnsure 8) Does the organization provide mandatory Security Awareness Training during onboarding? YesNoUnsure 9) Does your users have access to your internal confidential information remotely? YesNoUnsure 10) Do you have a single accountable person or committee responsible for the information / cybersecurity function in your organization? YesNoUnsure 11) Do you periodically review user accounts in all critical information systems? YesNoUnsure 12) Do you periodically review user activity on your network? YesNoUnsure 13) Do domain administrators use shared or generic accounts? YesNoUnsure 14) Do you have a current inventory of all network infrastructure devices, computers, and mobile devices? YesNoUnsure 15) Are sensitive and confidential data encrypted in transit & at-rest? YesNoUnsure 16) Are you required to secure and control confidential emails? YesNoUnsure 17) Does your organization develop its own mobile apps? YesNoUnsure 18) If yes, how do you secure your mobile apps? App ShieldingAnti-ObfuscationThreat HuntingMalware Detection & ResponseOffline Application ProtectionRuntime Application ProtectionOthers: 19) Do you know where your sensitive data resides in your environment? YesNoUnsure Environment 20) Current number of Users < 250250 - 500501 - 1000> 1000 21) Current number of Virtual Machines < 5050 - 250> 250 22) What type of VM Hosts do you have? KVMHyper-VContainerXenOthers: 23) Current number of legacy physical servers (Servers used more than 15 years) 0< 1010 - 2526 - 50> 51 24) Which Cloud Architecture are in use? Virtual MachinesContainersServerlessBare MetalOthers: 25) Which databases are in use? Microsoft SQL ServerOracle RDBMSIBM DB2MySQLPostgreSQLHadoopOthers: Desired Posture 26) Are you interested in any professional services? Cyberattack DrillSecurity WorkshopPenetration TestCompliance AssessmentRisk AssessmentSocial EngineeringVirtual CISOIncident Response & ForensicsCompliance Gap AnalysisOthers: 27) Compliance Standards Required PCI-DSSBNM RMiTPDPASSAE-18ISO 27001HIPAAFISMA/FedRAMPSOXDoD(various)ITAROthers: Contact Details 28) Name * 29) Email Address * 30) Company Name * 31) Anything specific in cybersecurity that you are looking for? Asset IntelligenceData DiscoveryData EncryptionEmail EncryptionEndpoint SecurityKey ManagementMobile Threat DefenseOthers: 32) Would you like to have a free cyberattack drill session? YesNo I've read and accept the Privacy Policy.