Statements from the following verified business professionals were used to create this chart:
Title |
Company Size |
Industry |
Response |
|
Security Manager |
Fortune 500 |
Industrial Manufacturing |
- Understanding behavioral data to pinpoint deviations and malicious activity: Very Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Moderately Important
- Continuously verifying access with the least friction for users, IT, and security teams: Moderately Important
|
|
Security Manager |
Medium Enterprise |
Consumer Products |
- Understanding behavioral data to pinpoint deviations and malicious activity: Very Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Moderately Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Moderately Important
|
|
Security Manager |
Large Enterprise |
Professional Services |
- Understanding behavioral data to pinpoint deviations and malicious activity: Moderately Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Moderately Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Moderately Important
|
|
Security Manager |
S&P 500 |
Insurance |
- Understanding behavioral data to pinpoint deviations and malicious activity: Very Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Very Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Very Important
|
|
IT Senior Vice President |
S&P 500 |
Financial Services |
- Understanding behavioral data to pinpoint deviations and malicious activity: Mildly Important
- Limiting the attack surface with segmentation and least privileges: Not At All Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Mildly Important
- Continuously verifying access with the least friction for users, IT, and security teams: Neutral
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Mildly Important
|
|
Security Officer |
Medium Enterprise |
Real Estate |
- Understanding behavioral data to pinpoint deviations and malicious activity: Very Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Moderately Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Very Important
|
|
IT Director |
Large Enterprise |
Electronics |
- Understanding behavioral data to pinpoint deviations and malicious activity: Very Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Moderately Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Very Important
|
|
Security Manager |
Large Enterprise |
Educational Institution |
- Understanding behavioral data to pinpoint deviations and malicious activity: Moderately Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Very Important
|
|
IT Director |
Medium Enterprise |
Industrial Manufacturing |
- Understanding behavioral data to pinpoint deviations and malicious activity: Moderately Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Moderately Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Moderately Important
|
|
IT Manager |
Small Business |
Consumer Products |
- Understanding behavioral data to pinpoint deviations and malicious activity: Very Important
- Limiting the attack surface with segmentation and least privileges: Very Important
- Automating security tied to context to improve the fidelity of alerts and incident response: Very Important
- Continuously verifying access with the least friction for users, IT, and security teams: Very Important
- Attack path visibility across endpoints, identity stores, workloads, and container environments: Very Important
|