Survey on network security tools

Thank you for your interest in participating in our upcoming research project! This brief survey (less than 5 minutes) is designed to help us determine if you are a good fit for the study.

Your responses are confidential and will not be shared outside of our research team.

Have any questions? Reach out to ashley.orr@portnox.com
1.What is your job title?(Required.)
2.Approximately, how many end users does your IT team support?(Required.)
3.In your organization, approximately how many endpoints require secure access to the corporate network?(Required.)
4.Briefly describe the key functional areas and roles within your IT organization. How are responsibilities distributed among teams or individuals?(Required.)
5.How would you describe your organization's IT infrastructure deployment?(Required.)
6.Which of the following Network Access Control (NAC) solution(s) are you currently using?(Required.)
7.What is your experience with the following IT products?(Required.)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
MFA (Multi-Factor Authentication)
PAM (Privileged Access Management)
DLP (Data Loss Prevention)
Attack Surface Management (ASM)
Secure Web Gateway
Captive Portal
Synthetic Wireless Performance Monitoring
NDR (Network Detection and Response)
IDS (Intrusion Detection System)
DNS Content Filtering
Network Honey Pot
8.What is your company's current status regarding the following IT products?(Required.)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
MFA (Multi-Factor Authentication)
PAM (Privileged Access Management)
DLP (Data Loss Prevention)
Attack Surface Management (ASM)
Secure Web Gateway
Captive Portal
Synthetic Wireless Performance Monitoring
NDR (Network Detection and Response)
IDS (Intrusion Detection System)
DNS Content Filtering
Network Honey Pot
9.Aside from NAC, what other type of network or security tools do you rely on in your environment?(Required.)
10.Please enter your name and email address. Your contact information will not be shared outside of this research group, and you will not be contacted unless invited to participate in the research study.(Required.)