We have a single CMMS
We have a single CMMS Yes
We have a single CMMS No
We have a single CMMS Always
We have a single CMMS Sometimes
We have a single CMMS Never
We have a single CMMS Initiative for 2022
We have an onboarding process to set up devices with the right settings
We have an onboarding process to set up devices with the right settings Yes
We have an onboarding process to set up devices with the right settings No
We have an onboarding process to set up devices with the right settings Always
We have an onboarding process to set up devices with the right settings Sometimes
We have an onboarding process to set up devices with the right settings Never
We have an onboarding process to set up devices with the right settings Initiative for 2022
We have an ISA*
We have an ISA* Yes
We have an ISA* No
We have an ISA* Always
We have an ISA* Sometimes
We have an ISA* Never
We have an ISA* Initiative for 2022
We have an ISA* to monitor connected devices
We have an ISA* to monitor connected devices Yes
We have an ISA* to monitor connected devices No
We have an ISA* to monitor connected devices Always
We have an ISA* to monitor connected devices Sometimes
We have an ISA* to monitor connected devices Never
We have an ISA* to monitor connected devices Initiative for 2022
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded.
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded. Yes
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded. No
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded. Always
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded. Sometimes
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded. Never
We have a process to ensure IoMT device vulnerabilities are addressed prior to the device connecting to the network or being onboarded. Initiative for 2022
Our CMMS is integrated with our ISA*
Our CMMS is integrated with our ISA* Yes
Our CMMS is integrated with our ISA* No
Our CMMS is integrated with our ISA* Always
Our CMMS is integrated with our ISA* Sometimes
Our CMMS is integrated with our ISA* Never
Our CMMS is integrated with our ISA* Initiative for 2022
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability Yes
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability No
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability Always
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability Sometimes
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability Never
Our CMMS, plus our ISA* is integrated with our work order management system so we can dispatch and track technicians with the instructions to correct a device affected by a vulnerability Initiative for 2022