What degree of integration is in place between the policy-based controls your security team uses and the technologies you use to analyze application behavior and develop trusted baselines? (Please check one per row)
How does your organization tune alert thresholds for your workload security tools in your on-premises environments over time? (Please check one)
How does your organization tune alert thresholds for your workload security tools in your cloud-based environments over time? (Please check one)
When your organization identifies a cybersecurity incident in your on-premises and cloud environments, how automated are response and remediation tasks? (Please check one)