01
02
03
04
05
06
07
08
09
10
Question 1 / 10
What % of your organization's employees work from home at least 2 days a week?
Up to 10%
11%-50%
51%-80%
Over 80%
NEXT
NEXT
Question 2 / 10
Your organization's security policy allows remote access to corporate applications...
choose all that apply
From personal mobile devices
From personal laptops
By third parties (contractors, consultants or partners)
From company-managed laptops
We do not allow any remote access
PREV
PREV
NEXT
NEXT
Question 3 / 10
How do you secure remote access to corporate applications?
choose all that apply
VPN connection
Zero Trust Network Access (ZTNA)
Multi-Factor Authentication
(MFA)
Device risk posture check
None of the above
PREV
PREV
NEXT
NEXT
Question 4 / 10
How have you been scaling remote access to corporate applications and networks?
Using on-prem security services
Using cloud-based security services
Both on-prem and cloud-based security services
None of the above
PREV
PREV
NEXT
NEXT
Question 5 / 10
How do you protect remote users while they are browsing the internet?
choose all that apply
Sanitize potentially malicious downloads
Restrict access to certain websites (e.g. block access to adult and gambling sites)
Prevent access to URLs known as malicious
Real-time scanning of online forms for phishing prevention
Prevent users from typing corporate credentials on non-business websites
None of the above
PREV
PREV
NEXT
NEXT
Question 6 / 10
How do you prevent sensitive business data from leaking outside the corporate network?
choose all that apply
Disk encryption on endpoint devices
Scan email and office applications for sensitive content before it is shared externally
Scan files for sensitive content before uploaded to external websites/messaging apps
None of the above
PREV
PREV
NEXT
NEXT
Question 7 / 10
Pick the applications your company's employees use for corporate email and collaboration
choose all that apply
On-prem email (Microsoft Exchange)
Office365
Gmail
Office apps like Teams, SharePoint and OneDrive
Google apps like Drive, Docs, Sheets and Meet
Other apps like Zoom, Slack and Dropbox
PREV
PREV
NEXT
NEXT
Question 8 / 10
In the case of a ransomware attack, my organization's endpoint protection can:
choose all that apply
Automatically detect and stop the attack
Quarantine the infected endpoint
Recover ransomware-encrypted files
None of the above
PREV
PREV
NEXT
NEXT
Question 9 / 10
Which of the following security solutions are being used in your company?
choose all that apply
Endpoint Protection (EPP) / Next Generation Anti Virus (NGAV)
Endpoint Detection & Response (EDR)
Mobile Threat Defense (MTD)
Email security
Collaboration apps security (OneDrive, Teams, etc.)
Secure Web Gateway
None of the above
PREV
PREV
NEXT
NEXT
Question 10 / 10
How many security vendors do you use to secure remote internet access, corporate access, email, endpoint and mobile devices?
1-3
4-6
7-9
10 and over
PREV
PREV
NEXT
NEXT
Calculating your score
PROGRESS
calc
OOOOOPS...
Please answer this question to move to the next one
GOT IT!