1
2
3
4
5
6
7
8
9
10
What % of your organization’s employees work from home at least 2 days a week?
Up to 10%
11%-50%
51%-80%
Over 81%
NEXT
Your organization’s security policy allows remote access to corporate applications
Choose all that apply
From personal mobile devices
From personal laptops
By third parties (contractors, consultants or partners)
Employees with company managed laptops and/or mobile devices
We do not allow any remote access
PREVIOUS
NEXT
Connecting remote users to corporate applications in your company requires
Choose all that apply
VPN connection
SASE connection (cloud-based service)
Multi-Factor Authentication (MFA) or Identification Provider (IDP)
Device risk posture check
PREVIOUS
NEXT
How have you been scaling remote access to corporate applications and networks?
Using on-prem security services
Using cloud-based security services
Both on-prem and cloud-based security services
PREVIOUS
NEXT
How do you protect remote users while they are browsing the internet?
Choose all that apply
Sanitize potentially malicious downloads
Restrict access to certain websites (e.g. block access to adult and gambling sites)
Prevent access to URLs known as malicious
Real-time scanning of online forms for phishing prevention
Enter corporate credentials to non-business websites
Scan for data leakage
PREVIOUS
NEXT
How do you prevent sensitive business data from leaking outside the corporate?
Choose all that apply
Disk encryption on endpoint devices
Scan email and office applications for sensitive content before it is shared externally
Permit the safe use of GenAI tools
Scan files for sensitive content before uploaded to external websites/messaging apps
Scan content that’s uploaded in the browser
I don't know
PREVIOUS
NEXT
Pick the applications your company’s employees use for corporate email and cloud applications
Choose all that apply
On-prem email (Microsoft Exchange)
Office365
Gmail
Office apps like Teams, SharePoint and OneDrive
Google apps like Drive, Docs, Sheets and Meet
Other apps like Zoom, Slack and Dropbox
PREVIOUS
NEXT
In the case of a ransomware attack, my organization’s endpoint protection can:
Choose all that apply
Automatically detect and stop the attack
Quarantine the infected endpoint
Recover ransomware-encrypted files
None of the above
PREVIOUS
NEXT
Which of the following security solutions are being used in your company?
Choose all that apply
NGAV /EPP
EDR / XDR / MDR
Mobile Threat Defense (MTD)
Email security
Cloud based application posture check
Collaboration apps security (OneDrive,Teams, etc.)
Secure Web Gateway
Cloud-based security services (SASE)
Endpoint & mobile vulnerability mgmt
PREVIOUS
NEXT
How many security vendors do you use to secure remote internet access, corporate access, email, endpoint and mobile devices?
1-3
4-6
7-9
10 and over
PREVIOUS
NEXT
Calculating your score
PROGRESS
calc