Monitor and report on Internet activity
Monitor and report on Internet activity 1. Not difficult
Monitor and report on Internet activity 2. Moderately difficult
Monitor and report on Internet activity 3. Very Difficult, looking for a solution
Monitor and report on Internet activity 4. Not Required
Monitor and report on internal network and user activity
Monitor and report on internal network and user activity 1. Not difficult
Monitor and report on internal network and user activity 2. Moderately difficult
Monitor and report on internal network and user activity 3. Very Difficult, looking for a solution
Monitor and report on internal network and user activity 4. Not Required
Monitor bandwidth on critical links
Monitor bandwidth on critical links 1. Not difficult
Monitor bandwidth on critical links 2. Moderately difficult
Monitor bandwidth on critical links 3. Very Difficult, looking for a solution
Monitor bandwidth on critical links 4. Not Required
Investigate security incidents on the network
Investigate security incidents on the network 1. Not difficult
Investigate security incidents on the network 2. Moderately difficult
Investigate security incidents on the network 3. Very Difficult, looking for a solution
Investigate security incidents on the network 4. Not Required
Monitor application activity
Monitor application activity 1. Not difficult
Monitor application activity 2. Moderately difficult
Monitor application activity 3. Very Difficult, looking for a solution
Monitor application activity 4. Not Required
Detect malware, infected systems
Detect malware, infected systems 1. Not difficult
Detect malware, infected systems 2. Moderately difficult
Detect malware, infected systems 3. Very Difficult, looking for a solution
Detect malware, infected systems 4. Not Required
Track access to confidential or critical data on internal file shares
Track access to confidential or critical data on internal file shares 1. Not difficult
Track access to confidential or critical data on internal file shares 2. Moderately difficult
Track access to confidential or critical data on internal file shares 3. Very Difficult, looking for a solution
Track access to confidential or critical data on internal file shares 4. Not Required
Monitor data leaving the network
Monitor data leaving the network 1. Not difficult
Monitor data leaving the network 2. Moderately difficult
Monitor data leaving the network 3. Very Difficult, looking for a solution
Monitor data leaving the network 4. Not Required
Monitor mobile device activity
Monitor mobile device activity 1. Not difficult
Monitor mobile device activity 2. Moderately difficult
Monitor mobile device activity 3. Very Difficult, looking for a solution
Monitor mobile device activity 4. Not Required
Monitor network activity of temporary staff or consultants
Monitor network activity of temporary staff or consultants 1. Not difficult
Monitor network activity of temporary staff or consultants 2. Moderately difficult
Monitor network activity of temporary staff or consultants 3. Very Difficult, looking for a solution
Monitor network activity of temporary staff or consultants 4. Not Required
Monitor user activity on remote sites
Monitor user activity on remote sites 1. Not difficult
Monitor user activity on remote sites 2. Moderately difficult
Monitor user activity on remote sites 3. Very Difficult, looking for a solution
Monitor user activity on remote sites 4. Not Required