Skip to content
Survey on network security tools
Thank you for your interest in participating in our upcoming research project! This brief survey (less than 5 minutes) is designed to help us determine if you are a good fit for the study.
Your responses are confidential and will not be shared outside of our research team.
Have any questions? Reach out to ashley.orr@portnox.com
*
1.
What is your job title?
(Required.)
Chief Officer (CIO/CTO/CISO/CMO/CEO)/Owner/Founder/President
Database Administrator
Help Desk
Infrastructure Architect
IT Consultant
IT Manager
IT VP
Network Engineer/Administrator
Security Engineer/Administrator
Systems Engineer/Administrator
Other (please specify)
*
2.
Approximately, how many end users does your IT team support?
(Required.)
Fewer than 200
200 to 999
1,000 to 10,000
More than 10,000
I'm not sure
*
3.
In your organization, approximately how many endpoints require secure access to the corporate network?
(Required.)
None
Fewer than 100 endpoints
100-500 endpoints
501-999 endpoints
1,000+ endpoints
I don’t know
*
4.
Briefly describe the key functional areas and roles within your IT organization. How are responsibilities distributed among teams or individuals?
(Required.)
*
5.
How would you describe your organization's IT infrastructure deployment?
(Required.)
Entirely on-premises
Mostly on-premises with some cloud
Roughly balanced between on-premises and cloud
Mostly cloud-based with some on-premises systems
Entirely cloud-based (e.g., SaaS, IaaS, PaaS)
I'm not sure
*
6.
Which of the following Network Access Control (NAC) solution(s) are you
currently
using?
(Required.)
I am not using a NAC solution
Aruba ClearPass
Cisco ISE
Forescout
Fortinet FortiNAC
Ivanti NAC
Microsoft NPS
Portnox
SecureW2
Other (please specify)
*
7.
What is your experience with the following IT products?
(Required.)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
MFA (Multi-Factor Authentication)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
PAM (Privileged Access Management)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
DLP (Data Loss Prevention)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
Attack Surface Management (ASM)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
Secure Web Gateway
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
Captive Portal
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
Synthetic Wireless Performance Monitoring
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
NDR (Network Detection and Response)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
IDS (Intrusion Detection System)
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
DNS Content Filtering
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
Network Honey Pot
I've never heard of it
I'm aware of it but never considered using it
I've used it in the past but not currently
I've considered it because it could solve an issue I have or am currently experiencing
I'm currently using it
*
8.
What is your company's current status regarding the following IT products?
(Required.)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
MFA (Multi-Factor Authentication)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
PAM (Privileged Access Management)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
DLP (Data Loss Prevention)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
Attack Surface Management (ASM)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
Secure Web Gateway
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
Captive Portal
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
Synthetic Wireless Performance Monitoring
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
NDR (Network Detection and Response)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
IDS (Intrusion Detection System)
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
DNS Content Filtering
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
Network Honey Pot
Not a priority
Researching or exploring options
Actively evaluating or planning to purchase
Already purchased or currently in use
I’m not sure
*
9.
Aside from NAC, what other type of network or security tools do you rely on in your environment?
(Required.)
*
10.
Please enter your name and email address. Your contact information will not be shared outside of this research group, and you will not be contacted unless invited to participate in the research study.
(Required.)
Full name
Email address