Power list – November 2019

We appreciate your participation and look forward to hearing from you. CISO MAG is conducting a survey on endpoint protection security solutions (both EPP and EDR) for its November ‘19 issue.

We invite decision makers in businesses of all sizes, and across geographies to participate in the survey, the results of which will culminate in a report for the November ‘19 issue.

All responses to the survey will be strictly confidential; the names of the participating companies, business leaders, and specific responses will not be revealed in the story – or to any third-party.

It will take 10 minutes or less to respond to this survey.

Also, get a chance to be a part of our weekly lucky draw. Every week 3 lucky participants will get Amazon vouchers from EC Council's CISO MAG. All you have to do it fill out this survey. Hurry Up!!

Thank you in advance for your participation! 

It is mandatory to answer all the questions.

Question Title

* 1. How far has your organization gone in deploying an endpoint security solution?

Question Title

* 2. Which of the following is your chief reason for deploying or considering an endpoint security solution?

Question Title

* 3. If you are using an end point security solution, what is the primary capability that you are using?

Question Title

* 4. Does the endpoint securitysolution that you are using also include Managed Endpoint Detection Services?

Question Title

* 5. For your endpoint security deployment, how do you do ongoing security monitoring and management of the endpoints?

Question Title

* 6. When considering an endpoint security solution, what is the primary consideration?

Question Title

* 7. When considering an endpoint security solution, what is the secondary consideration?

Question Title

* 8. Which is your preferred architecture for managing your endpoint security deployment?

Question Title

* 9. What is the main factor in deciding what type of endpoint solution to deploy?

Question Title

* 10. What is the biggest challenge your organization faces/faced in deploying an endpoint security solution?

Question Title

* 11. Your Information (CISO MAG would like to send you a token of appreciation for taking the time to complete the survey.)

All responses to the survey will be strictly confidential; the names of the participating companies, business leaders, and specific responses will not be revealed in the story – or to any third-party.

0 of 11 answered
 

T