Ericom Software Secure Browsing Questionnaire
1.

Name 

 

50 characters left.
2.

Company Name 

 

50 characters left.
3.

Email Address

 

50 characters left.
Please select the best response for each question.
 
4.

What industries do you serve?

Information Technology
Financial services (banking, insurance, brokerage, etc.)
Government
Healthcare
Legal
Transportation
Manufacturing
Telecom
Retail
Education
Other  
5.

Which best describes your role?

IT Director/Manager/Admi-
nistrator
Owner/President
CISO
Compliance Officer or Manager
Network Security Engineer
Other  
6.

How many employees do you have organization-wide?

Less than 10
11-25
26-100
101-250
251-500
501 or more
7.
From 1-8 (1 being the most important, 8 the least important), please rank your security project goals.


(1 = Most Important)
 
Compliance with Mandatory Regulation/Policy
Cost Savings
Improve Endpoint Security (Malware, Ransomware, Cryptojacking, etc.)
Prevent Industrial Espionage
Protecting Access to Legacy Browsers
Managing Browsing History/Audit Trail
Data Leakage
Other - Please specify
  • Comment:

  • 500 characters left.
8.
Do you have a cybersecurity strategy in place?

Yes
No
9.
If yes, how confident are you that it will pre-empt an Internet-borne threat?

Extremely Confident
Confident
Moderately Confident
Not Confident
N/A
10.
Has your organization ever fell victim to a cyberattack?
Yes
No
11.
If yes, what was the estimated cost on the impact?
< $1 million
$1-4 million
> $5 million
N/A
12.
If a cyberattack occurred, how long can your organization tolerate downtime?
< the average 8-hour work day
2-3 days
4-5 days
> 5 business days
13.
Were you able to analyze the source of the attack?
Yes
No
14.
What is the percentage range of time users are utilizing the Internet and browser-based applications?
Less than 25 percent
26 to 50 percent
51 to 75 percent
more than 76 percent
15.

 Are you currently concerned with data leakage?

Yes
No
16.

If yes, how concerned are you? 

Extremely Concerned
Concerned
Moderately Concerned
Not Concerned
17.
Which of the following represents the largest threat to your organizations?

Ransomware
Malware
Crypto-jacking
Phishing
Spoofing
Other  
18.

Are downloads by your employees allowed and/or controlled?

Yes
No
19.
If yes, do you have a Content Disarm & Reconstruction (CDR) solution in place? 

Yes
No
20.

Are you familiar with Remote Browser Isolation (RBI) technology that enables employee secure browsing? 

Yes
No