Security Posture Assessment

Get a quick view of how your IT security measures up and the key steps to improve your security posture.

Start Quiz

Security Posture Quiz

Do you have an antivirus?

A standard for almost all companies, antivirus software is a good first step.
Back
Progress bar

Do you have a firewall?

Firewalls have been around for decades and are one of the first steps to securing your network from unauthorized traffic.
Back
Progress bar

Do you have a next-gen firewall?

NGFWs are deep-packet inspection firewalls that move beyond port/protocol inspection and blocking to add application-level inspection, intrusion detection and bringing intelligence from outside the firewall (source: Gartner)
NGFWs are deep-packet inspection firewalls that add application-level inspection, intrusion detection and bringing intelligence from outside the firewall (source: Gartner)
Back
Progress bar

Do you have a SIEM?

Security Information and Event Management systems log data and provide useful analytics to identify and eliminate threats. SIEM is one of the most important tools for a strong security posture, helping your team focus on the right incidents.
Security Information and Event Management systems log data and is one of the most important tools for a strong security posture, helping your team focus on the right incidents.
Back
Progress bar

Do you have an Endpoint Management tool?

One of the key tools in IT security, Endpoint Management provides full visibility of devices that access your network. This visibility, and the actionable insights it provides your team, enables quick response to threats and compliance across all devices.
One of the key tools in IT security, Endpoint Management provides full visibility of devices that access your network.
Back
Progress bar

Do you have Endpoint Security?

Endpoint Security goes a step further in protecting the numerous endpoints that reach your network by adding next-gen anti-malware and anti-virus threat hunting.
Endpoint Security goes further in protecting endpoints that reach your network with next-gen anti-malware and anti-virus threat hunting.
Back
Progress bar

Does your company use cloud-hosted services?

Many cloud-based services (like SalesForce, Workday, ServiceNow, Dropbox, and Box, etc.) store your data in their cloud. Although security measures may be in place for each network, there may still be vulnerabilities between them.
Such as SalesForce, Workday, ServiceNow, Dropbox, Box, etc.
Back
Progress bar

Do you have CASB?

Cloud Access Security Brokers help secure your data and applications in the cloud, essentially creating a secure 'tunnel' to access it.
Back
Progress bar

Do your customers log in to your company portal and provide user credentials?

Back
Progress bar

Do you have Web Fraud Protection?

Without web fraud detection & protection companies (Financial Institutions in particular) are subject to fraud and account takeover attacks that have significant impact on their business.
Fraud and account takeover attacks can have a significant impact on  business, particularly for Financial Institutions.
Back
Progress bar

Do you store private data?

Whether it's internal data, Intellectual Property, or external customer information, many companies store valuable data.
Back
Progress bar

Do you have Data Security software?

Protecting sensitive data against threats with encryption, masking, redaction, activity monitoring, dynamic blocking, alerting and quarantines.
Back
Progress bar

Do you have an Incident Response Platform?

IRP, or Incident Response, aligns your entire company to properly respond when a breach does occur. This allows security teams to analyze, respond to, and mitigate incidents faster.
Back
Progress bar

Almost done!

Please provide your contact information and we'll email your answers and result (and show you on the next page).
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Back
Progress bar

Keeping your security immune system in check

Thinking of your IT Security like an immune system helps to visualize the mutlifaceted requirements for a strong security posture. IBM uses this analogy with regards to their solutions for prevention, defense, and remediation.

And just like an individual getting a physical, enterprise IT systems can also benefit from a regular check up. While some health checks may be high level (like our security posture assessment quiz above), they're typically free and meant to start a conversation. Other assessments may be more detailed and billed as a project meant to provide more specific and actionable results.

image source: Security Intelligence

Another option is to have a "health app" for daily monitoring. In this analogy, a Managed Security Service Provider (MSSP) is like your Watch, monitoring your IT security health in real time. And similar to health app reminders, an MSSP ensures your system is tuned and up to date on patching - improving your security posture.

Learn More About MSSP