Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links.
We also use some non-essential cookies to anonymously track visitors or enhance your experience of the site.
To control third party cookies, you can also adjust your browser settings.
Thanks for taking our Network Security Questionnaire. Click on your response and then click the "Next" button. After 10 quick questions, we'll provide you a scorecard that includes an overall rating as well as specific recommendations.
We have different solutions for web, email, network and end user security and like to choose the best solution in its class.
We have a UTM appliance with one streamlined interface and all security features managed in one place.
We’re a small company without the type of security concerns that large organizations have. We need to compromise on security to save cost.
We use a separate reporting tool to collect information from our security devices.
Our firewall has basic daily reporting, but doesn’t offer deep insight about abnormalities or when reporting over longer time periods.
Our firewall offers comprehensive reports that include all security information and events. Normally I only look at the daily summary report. But if necessary I can view activity over weeks or months.
We have an anti-spam solution and trust our employees to have the common sense to avoid any scams and phishing attacks that get through.
Our users are protected against phishing attacks, but only as long as they’re inside the building or on the business network.
We have integrated, layered protection in place that protects users against email attacks wherever they are.
We use a consumer-grade solution.
We have a dedicated enterprise-grade wireless controller and access points, and we set up our firewall to control network access.
Our solution includes a wireless controller with access point deployment for central and branch offices, and integrated access control for guests.
Maybe now’s a good time to ask for budget to get extra bandwidth.
We contact our vendor to find out which applications are consuming the most bandwidth.
We prioritize business applications and use graphical real-time reports to find the source of performance issues.
We have granular control over categories in our next-gen firewall, so some employees have access while others don’t.
We block all social media pages and games.
We don’t block anything but we monitor our employees for abuse.
We can extend our policies to our remote sites with a low-cost VPN.
We have a number of appliances and it takes a lot of time to get them up and running, add new users or sites, and make configuration changes.
We have the resources to quickly add sites, but we worry the security level won’t match our standards in headquarters.
We use the same tool for contractors and employees. Contractors need to sign a NDA before they get full access.
Our solution provides different types of access for a range of devices and scenarios and integrates with security policies.
We don’t give remote access to the network. Contractors need to come on site so we can supervise them.
We’re not concerned because hackers only attack large companies.
We just have a firewall in front of our OWA.
We have a web application firewall included in our solution which can handle and secure OWA.
We use a firewall and a separate antivirus solution to protect our machines. We’re not protecting or managing our users’ personal mobile devices at this time.
We’re looking into additional solutions that block more complex threats, but are finding it difficult to separate the hype from true business needs.
Our solution offers layered protection with antivirus, a firewall, and advanced malware protection.
Sophos Ltd. Tous droits réservés.