Are You Ready?
1) Which methods of identity authentication and authorization do you use before providing access to your users?
2) How do you currently provide enterprise application access for your users?
3) How isolated is your network infrastructure from the public Internet?
Less Isolated Than Preferred
4) To what extent are you able to monitor Internet-bound traffic and activity?
High Level of Monitoring
Good, but Could be Better
Need to Monitor More
Your Contact Information
Tell Us More
Should be Empty: