CONTACT

Zero Trust Made Simple

Rapid Self Assessment for Your Zero Trust Needs

Score yourself using our mini-assessment tool. Easily identify your organization’s Zero Trust Maturity in each of the following categories:
This is a mini-assessment, to request a full in-person assessment
Click Here

Identity

Devices

Networks

Applications and Workloads

Data

Cross-Cutting Capabilities

Details

1.0 Identity

Authentication

1.1 How does the system authenticate user identity?

Governance Capability

1.2 How does the system implement policies for enterprise-wide enforcement?

Identity Stores

1.3 What kind of identity store mechanism does the system use?

2.0 Devices

Policy Enforcement & Compliance Monitoring

2.1 How does the system secure all devices and manage risk?

Visibility and Analytics Capability

2.2 How does the system maintain inventory of all physical devices and virtual assets and conduct monitoring and anomaly detection?

Asset & Supply Chain Risk Management

2.3 Does the system track all physical and virtual devices and manage supply chain risk?

3.0 Networks

Network Segmentation

3.1 How does the system define the network architecture?

Visibility and Analytics Capability

3.2 What type of network monitoring capabilities does the system use?

Network Traffic Management (New Function)

3.3 How does the system manage internal and external network traffic?

4.0 Applications and Workloads

Application Access (Formerly Access Authorization)

4.1 How does the system authorize application access?

Visibility and Analytics Capability

4.2 Does the system perform security monitoring of all applications to maintain enterprise-wide comprehensive visibility?

Application Threat Protections (Formerly Threat Protections)

4.3 How does the system integrate threat protections into all application workflows?

5.0 Data

Data Inventory Management

5.1 How does the system identify and manage data inventory?

Data Categorization

5.2 How does the system implement data categorization?

Data Availability

5.3 What mechanisms does the system use to make data available including historical data?

6.0 Cross-Cutting Capabilities

Visibility and Analytics

6.1 Does the system maintain a comprehensive visibility that informs policy decisions and facilitate response activities?

Governance

6.2 How does the system implement policies for enterprise-wide enforcement?

Automation and Orchestration

6.3 Does the system have automation and orchestration capabilities to support robust and streamlined operations to handle security incidents and respond to events as they rise?

7.0 Zero Trust Maturity Level – Unlock Your Score

Submit the form below to receive your score and an email will be sent to the address provided with some additional considerations.

Contact Information

First Name*:


Names must be between 2 and 50 letters only.

Last Name*:


Names must be between 2 and 50 letters only.

Email*:


Organization:


Organization must be between 2 and 50 letters only.

Phone No:


Phone number must be in ###-###-#### format
Group 3290 (1)