Statements from the following verified business professionals were used to create this chart:
Title |
Company Size |
Industry |
Response |
|
IT Director |
Medium Enterprise |
Computer Software |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Don’t agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Don’t agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
Security Engineer |
Large Enterprise |
Banking |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|
|
Cyber Security Engineer |
Small Business |
Banking |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
Security Consultant |
Large Enterprise |
Telecommunications Services |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
Engineer |
Large Enterprise |
Computer Services |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|
|
IT Security Architect |
Large Enterprise |
Retail |
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Don’t agree
|
|
Manager |
State & Local |
Government |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|
|
IT Manager |
Global 500 |
Banking |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
|
|
IT Director |
State & Local |
Government |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|
|
Cyber Security Engineer |
Medium Enterprise |
Industrial Manufacturing |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|