Statements from the following verified business professionals were used to create this chart:
Title |
Company Size |
Industry |
Response |
|
Security Officer |
Large Enterprise |
Security Products & Services |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
Principal Network Engineer |
Large Enterprise |
Telecommunications Services |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
IT Director |
Medium Enterprise |
Computer Software |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Don’t agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Don’t agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
Enterprise IT Security Engineer |
Small Business |
Professional Services |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|
|
Network Engineer |
Medium Enterprise |
Computer Software |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
IT Security Architect |
Large Enterprise |
Retail |
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Don’t agree
|
|
Cyber Security Engineer |
Large Enterprise |
Media & Entertainment |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|
|
Security Engineer |
Global 500 |
Insurance |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Don’t agree
|
|
Network Engineer |
Educational Institution |
Educational Institution |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Agree
|
|
Incident Responder |
Global 500 |
Computer Services |
- Detect, and mitigate DDoS attacks that impact availability of network, services or stateful security devices: Strongly agree
- Detect and block inbound IoCs, brute force password attempts and reconnaissance: Strongly agree
- Detect and block outbound IoCs or communication from compromised internal devices communicating with attacker command and control infrastructure: Strongly agree
- Stopping DDoS attacks or other cyberthreats embedded in encrypted traffic: Strongly agree
|