Page1 / 1
 
100% of survey complete.

Question Title

* 1. Which of the following best matches your job description? (pick one)

Question Title

* 2. How many users are on your network ?

Question Title

* 3. How many locations or sites are on your network?

Question Title

* 4. Under what circumstances do you want to receive an immediate alert? Select all that apply.

Question Title

* 5. Please select which of the following is of most interest to you:

Question Title

* 6. With your current tools, how easily can you

  1. Not difficult 2. Moderately difficult 3. Very Difficult, looking for a solution 4. Not Required
Monitor and report on Internet activity
Monitor and report on internal network and user activity
Monitor bandwidth on critical links
Investigate security incidents on the network
Monitor application activity
Detect malware, infected systems
Track access to confidential or critical data on internal file shares
Monitor data leaving the network
Monitor mobile device activity
Monitor network activity of temporary staff or consultants
Monitor user activity on remote sites

Question Title

* 7. "We want to understand what is important to you when monitoring your network ..."

  1. I already have this 2. Not a current requirement 3. Nice to have 4. Critical
I am presented with data that can be easily understood and acted on
Only relevant information is stored for future use, troubleshooting, etc, so that I do not have too much data to analyze
I can correlate network information back to a specific user or application
I can see warnings and alarms through a unified view rather than multiple dashboards
I can drill down to granular readable detail and really understand what is happening
I receive accurate instant alerts when something unusual or suspicious is happening

Question Title

* 8. "I need the right level of visibility when monitoring my network ..."

  1. Not important 2. Moderately important 3. Critical
So that I can monitor and troubleshoot local and remote networks via a single dashboard
So that I can monitor internal activity, the core of my network
So that I can monitor and really understand Internet activity
So that I can monitor email to detect spam, phishing, policy breaches
So that I can understand the applications using the network and who is using them
So that I can immediately identify misuse of the network or critical resources
So that I can monitor confidential and critical data that is being removed from the network or is being accessed on the network
So that I can immediately detect malware entering the network
So that I can continuously monitor network security
So that I can always see what users are doing
So that I have historical data to help troubleshoot, investigate issues and generate reports
So that I can demonstrate compliance with regulatory compliance audits

Question Title

* 9. Personal details - If you would like a copy of the survey results emailed to you please complete the following:

T