What percentage of your Network's activities are automated (i.e., troubleshooting, configuration, deployment, etc.)?
Less than 10%25%
11% to 25%47%
26% to 50%19%
51% to 75%6%
76% or more2%
Content you might like
Is the Double Diamond Design Model Still Relevant? In today’s world where code can be pushed multiple times a day, and prototypes quickly tested, the rigid phases of the Double Diamond can feel constraining. The model’s omission of execution for three-quarters of the process could create significant risk. Do you think is it time to reconsider this design approach?
Patch management: to reduce attack surface and avoid system misconfigurations39%
Malware and ransomware prevention: to protect endpoints from social engineering attacks59%
Malware and fileless malware detection and response: to protect against malicious software49%
Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls33%
Not planning to change endpoint security strategy9%