Home
Services
Security Vendor Landscape
Key Trends
Security Frameworks
Zero Trust
Secure Access Service Edge
Secure & Protect The Cloud
Identity & Access Management (IAM)
Managed Security Services
Vulnerability Management
Security Awareness Training
Email & Endpoint Protection
Business Continuity
Ransomware Protection
Contact
Contact Information
*
Indicates required field
Primary Contact Name
*
First
Last
Title
*
Email
*
Phone Number
*
How did you hear about the assessment
*
Are you a student in the Security Practice Development Program
*
No
Yes
% Services Revenue
*
% Product Revenue
*
# of Sales Associates
*
# of Tech Associates
*
List any specific expertise or key verticals
*
List Client Demographics
*
Please describe your role in the company
*
Business Readiness
Our company strives to understand our clients business goals and objectives
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
Our sales teams mostly focus on
*
---- Select a Response ----
1 Achieving quarterly or monthly sales quotas
2
3 Up-sell or provide add-ons when presented the opportunity
4
5 Taking long term approach to meeting client objectives
Our company's approach to solution selling is as follows
*
---- Select a Response ----
1 We're happy to take the client's PO and move on
2
3 We try to upsell & cross-sell to increase order size
4
5 We think long term and look beyond the immediate sale
Percentage of company's sales where services are included
*
---- Select a Response ----
1 = 20%
2 = 40%
3 = 60%
4 = 80%
5 = 100%
Describe how your sales teams are compensated today and plans for future consideration
*
Our executives are comfortable meeting with Lines of Business and C-Suite of our clients
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 To Some Extent
4 Agree
5 Strongly Agree
Our sales associates are comfortable meeting with Lines of Business and C-Suite of our clients
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 To Some Extent
4 Agree
5 Strongly Agree
Our technical teams are comfortable meeting with Lines of Business and C-Suite of our clients
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 To Some Extent
4 Agree
5 Strongly Agree
Our company partners well with local, regional or national providers to fill gaps
*
---- Select a Response ----
1 Never
2 Sometimes
3 50/50
4 Usually
5 Always
Describe your marketing plans to focus on the high growth Digital Transformation markets
*
---- Select a Response ----
1 We do not have any marketing strategy
2 We have not made any changes to Security
3 We are thinking about improving it
4 We would like to market our Security solutions but need help
5 Our marketing strategy is a key driver for our Security Practice
Describe what you look for in a complementary partnership
*
Team Readiness
Higher associate technical and sales skills help drive sales and create higher project margins and higher client satisfaction, resulting in more retained clients and references.
Regarding the company's employee development program:
*
---- Select a Response ----
1 Is Non-existent
2 Is Barely Noticeable
3 Is Sufficient
4 Is Robust
5 Differentiates Our Company
Our sales team gives us a significant competitive advantage
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
We encourage and support sales and technical certifications in order to:
*
---- Select a Response ----
1 Satisfy Vendor Programs
2
3 Establish and market our credentials
4
5 Remain on the cutting edge
We are confident in our sales team's ability to identify and sell full solutions
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
Compensation programs are designed to reward & retain our employees to achieve our long term goals
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
Financial Acumen
Our sales teams are able to have sophisticated financial discussions with client decision makers
*
---- Select a Response ----
1 Never
2 Sometimes
3 50-50
4 Usually
5 Always
Percentage of time our client proposals include creative finance and credit options
*
---- Select a Response ----
1 = 20%
2 = 40%
3 = 60%
4 = 80%
5 = 100%
When designing a technology solution, our sales teams are discussing refresh cycles with the client
*
---- Select a Response ----
1 Never
2 Sometimes
3 50-50
4 Usually
5 Always
Our company differentiates itself by offering creative payment solutions to our clients
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
Please share some of the financial objections that your clients regularly present
*
Identify
The
IDENTIFY
Function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs.
Click HERE for examples
Our sales team understand customer needs related to cyber security and they are able to uncover associated opportunities
*
---- Select a Response ----
1 Not so much
2 We are not sure where to start
3 We have pockets of knowledge
4 Getting better every day
5 We are proficient
We maintain current industry (e.g. CISSP) and/or vendor (e.g. Cisco) certifications
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 To some extent
4 Agree
5 Strongly Agree
We provide security certification training classes, either OEM or industry-related, to our end-users
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
Our company provides security education to our end-users in the form of Lunch and Learns or other educational events
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
We assist our customers with compliance and corresponding audits (HIPAA, PCI, NIST, GDPR, CCPA, etc.)
*
---- Select a Response ----
1 What are compliance audits
2
3 We are aware but not involved
4
5 Yes it is a core value we provide
We manage our clients assets as a complete life-cycle service
*
---- Select a Response ----
1 Not at all
2 We're just getting started
3 We provide some services
4 Investments are paying off
5 Yes it is a core value we provide
Describe your focus on data governance
*
---- Select a Response ----
1 We don't have a focus
2
3 We understand it but do not offer
4
5 It is a key value we provide
We offer network Security Assessments, Pen Testing, and Security Scorecards
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
We offer other Security Services such as Firewall Configuration, Audits, or Security Control Assessments?
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
What other thoughts can you share regarding your ability to identify threats to your clients businesses?
*
Protect
The
PROTECT
Function outlines appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cyber security event.
Click HERE for examples
We offer robust endpoint protection to our customers (anti-virus, anti-malware solutions)
*
---- Select a Response ----
1 Not at all
2 Somewhat
3 We could do more
4 Some of the time
5 Every opportunity
We offer/provide security awareness training to our clients
*
---- Select a Response ----
1 Not at all
2 Somewhat
3 We could do more
4 Some of the time
5 Every opportunity
Describe your Identity and Access management strategy
*
---- Select a Response ----
1 We don't have a focus
2
3 We understand it but do not offer
4
5 It is a key value we provide
Our encryption services offering is
*
---- Select a Response ----
1 We do not understand this topic
2
3 We are lacking in sophistication
4
5 We are proficient and it’s a core value
Our company installs, manages and monitors our client's firewalls
*
---- Select a Response ----
1 None of these
2
3 We do some of these
3
5 We provide all of these
Our company provide email security through inbound malware scanning and reputation filtering
*
---- Select a Response ----
1 Not at all
2 Somewhat
3 We could do more
4 Most of the time
5 At every opportunity
We offer multi-factor authentication to our clients
*
---- Select a Response ----
1 We don't have a focus
2
3 We understand it but do not offer
4
5 It is a key value we provide
Describe your strategy for cloud access security
*
---- Select a Response ----
1 We don't have a focus
2
3 We understand it but do not offer
4
5 It is a key value we provide
We offer web browsing protection and/or encrypted DNS solutions
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
We segment networks and micro-segment workloads when appropriate
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
What other thoughts can you share regarding your ability to protect your customers from cyber attacks?
*
Detect
The
DETECT
Function defines the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events.
Click HERE for examples
Our SIEM and SOAR offering is best described as follows
*
---- Select a Response ----
1 We struggle with 4 letter acronyms
2
3 We have some capability
4
5 We consider ourselves proficient
If offering end-point protection, describe your solution's ability to analyze behavior & identify threats
*
---- Select a Response ----
1 We do not offer end-point security
2
3 We are not sure what this means
4
5 We offer advanced analytic detection
Regarding your company's Security Operations Center offering
*
---- Select a Response ----
1 We do not offer SOC Services
2 We are looking into SOC services
3 We are partnering or using 3rd party SOC
4 We are starting to build our own SOC
5 We have a fully functioning SOC offering
Security access control is an important solution we offer our clients
*
---- Select a Response ----
1 Not at all
2 We're just getting started
3 We provide some services
4 Investments are paying off
5 Yes it is a core value we provide
We see value in offering security assessments including testing or wireless networks
*
---- Select a Response ----
1 We see no value in offering assessments
2 We offer them but struggle with bandwidth
3 We see value and offer them but need assistance
4 We see value and are solid on security assessments
5 Our assessment services are core to our value business
We provide phishing campaigns and social engineering awareness training to our clients
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
What other thoughts can you share regarding your ability to detect cyber attacks?
*
Respond
The
RESPOND
Function includes appropriate activities to take action regarding a detected cybersecurity incident. The Respond Function supports the ability to contain the impact of a potential cybersecurity incident.
Click HERE for examples
Our clients have incident response plans in the event of a breach
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
Describe your ability to scale and add resources should a client get breached
*
---- Select a Response ----
1 Not at all
2 We've given it some thought but haven't acted
3 Somewhat but we couldn't handle a significant breach
4 We've started to identify 3rd party providers to help us
5 We can scale or have trusted advisor network to tap into
Describe your client discussions regarding risk tolerance and threat assessments
*
---- Select a Response ----
1 We do not have those discussions as we are not comfortable
2 We'd like to start but clients are reluctant to discuss
3 We're starting to have more and more conversations
4 These seem to come up only after an incident occurs
5 We discuss as part of a our managed service offering
We understand the importance of digital forensics and it is a differentiator for us
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 To some extent
4 Agree
5 Strongly Agree
Our clients have clarity on the ramifications of downtime and have a solid business continuance plan in place
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
Our company proactively monitors and manages software patches and firmware updates
*
---- Select a Response ----
1 Not at All
2 Somewhat
3 We could do more
4 Most of the time
5 At Every Opportunity
What other thoughts can you share regarding your ability to respond to your clients breaches?
*
Recover
The
Recover
function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident.
Click HERE for examples
We manage our clients data, review data sets, and test recovery procedures
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 Not Sure/Undecided
4 Agree
5 Strongly Agree
Our security services include off-line and cold storage
*
---- Select a Response ----
1 Strongly Disagree
2 Disagree
3 To some extent
4 Agree
5 Strongly Agree
We have established a recovery procedure offering including prioritization of tasks
*
---- Select a Response ----
1 Not at all
2 We're just getting started
3 We provide some services
4 Investments are paying off
5 Yes it is a core value we provide
We are offering Cyber Insurance to our clients
*
---- Select a Response ----
1 We did not know there was such a thing
2 We need to learn more about this
3 We are exploring various offerings
4 Yes, we do offer Cyber Insurance
5 Cyber Insurance is a unique element of our security services
What other thoughts can you share regarding your ability to help clients recover from attacks?
*
Submit
Home
Services
Security Vendor Landscape
Key Trends
Security Frameworks
Zero Trust
Secure Access Service Edge
Secure & Protect The Cloud
Identity & Access Management (IAM)
Managed Security Services
Vulnerability Management
Security Awareness Training
Email & Endpoint Protection
Business Continuity
Ransomware Protection
Contact