Features
Download
Threat intelligence survey
Thank you
Thank you for taking the time to answer this survey. Your response is greatly appreciated and takes us all a step further in understanding the state of threat intelligence today.
Threat intelligence habits
1. Are you using a threat intelligence solution to secure your network?
Yes
I'm actively looking for a threat intelligence solution
I want to, but I'm not sure how
No
2. Have you subscribed to any threat feeds independently?
Yes
No
3. Do you manually go through the latest threat reports/papers/statistics to build your awareness and guide your security strategy?
Yes
No
Threats encountered
4. What types of threats do you encounter most often in your enterprise network?
Malware (like ransomware)
C&C servers/botnets
Phishing
Data exfiltration
Spam
Vulnerabilities/exploits
Other (please specify)
Threat intelligence solution selection criteria
5. Please rate the below criteria based on how important they are to you when selecting a threat intelligence solution:
Not important
Neutral / Somewhat
important
Very important
Allows me to select which threat feeds need to be monitored.
Finds a match within my network data and alerts me.
Provides contextual information about a threat like threat category and geographic information.
Allows me to prioritize threats based on their risk score, recency, and frequency of occurrence.
Confirms patterns of suspicious activity by a malicious actor before alerting me.
Is part of a more comprehensive solution (for example, a SIEM solution would provide log management, analysis, and compliance apart from threat intelligence).
Others (Please specify)
Email
Please enter email address
Please enter business email address
Company size
Less than 100 employees
100-1,000 employees
More than 1,000 employees
Country
By clicking '
Submit
', you agree to processing of personal data according to the
Privacy Policy
.
2020
Zoho Corporation Pvt. Ltd. All rights reserved.