Implementing end-to-end encryption21%
Regularly monitoring for threats61%
Setting strict access control rules5%
All of the above10%
374 PARTICIPANTS
3.6k views1 Comment
Sort by:
Content you might like
Can someone provide feedback on the Midpoint IGA product from Evolveum? Feedback about the product and engineering would be helpful..
We currently have a Netwitness platform that we are using specifically for packet capture and network analysis only. No SIEM, no response, strictly just packet capture and network analysis. We are looking to replace it as is, meaning we are looking for recommendations for packet capture and network analysis tools. No SIEM, No SOAR, no EDR. Can anyone suggest a tool that works similarly that is also a SaaS product?
Does your organization leverage an Enterprise Architecture Solution/Tool for EA Practice?
Yes76%
No17%
We are in the process of selecting an EA tool8%
Production data analysis19%
Equipment data analysis (capacity, etc.)59%
Part of overall equipment effectiveness analysis16%
Other (share below)4%
Monitor, secure, protect and detect
All of the above is the only real way to protect and secure your data transfer. If you don’t have visibility, you’re flying blind