总的来说,我们将贵组织评级为:

{{overallRating_cn}}

检测
就遵循检测最佳实践主动保护贵组织而言,您被评级为:
{{cat1Rating_cn}}

 

请观看视频以了解摘要信息。

应对
就快速高效地应对网络事件以减少损坏/负面影响而言,您被评级为:
{{cat2Rating_cn}}

 

请观看视频以了解摘要信息。

恢复
就在网络事件发生后恢复数据并继续运营而言,您被评级为:
{{cat3Rating_cn}}

 

请观看视频以了解摘要信息。

您的自定义网络弹性报告

感谢您参加由 ESG 提供支持的 Dell Technologies 网络弹性自我评估。本评估旨在帮助您了解贵组织目前易受勒索软件及其他复杂网络攻击的程度,确定存在漏洞的方面,并说明您可以采取哪些措施来应对这些风险。为此,我们会评估贵组织在以下三个重要方面的准备情况:主动式威胁检测、敏捷威胁应对以及恢复功能的完整性。
根据您针对上述每个方面评估给出的回答,我们将贵组织归类为{{overallRating_cn}}。这在本评估中表示{{overallLevel_cn}}级别的准备情况。以下几页详细说明了贵组织获得此评级的原因,并提供了可供贵组织参考的建议。
 

检测

本评估的第一部分重点关注主动式威胁检测,即,贵组织为检测和防范网络攻击或勒索软件相关的事件而采用的技术和流程。仅考虑这一方面,贵组织被评级为{{cat1Rating_cn}},在本评估中表示{{cat1Level_cn}}级别的准备情况。
  • 在评估一开始,我们询问了您的团队关注的威胁。这一点很重要,因为正如 ESG 的 2020 年支出意向研究所显示的那样,许多组织都在不断遭受一连串的勒索软件攻击以及其他形式的复杂网络攻击(参见图 1)。  {{textInsert01}}
数字 1

来源: ESG

  • 我们还请您考虑了贵组织满足合规性要求的能力。 {{textInsert02}}
  • 本评估提到贵组织使用风险框架来指导您的安全计划。  {{textInsert03}}
  • 接下来,本评估涉及端点、云和网络可见性。 {{textInsert04}}
  • 最后,评估的重点是为专门抵御勒索软件攻击而实施的控制的效力。 {{textInsert05}}

应对

评估的第二部分重点关注敏捷威胁应对,即,贵组织为快速应对安全或勒索软件事件从而限制其影响而采用的技术和流程。仅考虑这一方面,贵组织被评级为{{cat2Rating_cn}},在本评估中表示{{cat2Level_cn}}级别的准备情况。
  • 我们询问您,对于一次成功的勒索软件攻击,您的最可能应对方式是什么。 {{textInsert06}}
  • 接下来,我们询问,您分配了多少时间、工作和预算来保护辅助数据副本。 {{textInsert07}}
  • 在应对准备方面, {{textInsert08}}
  • 本评估为了实现特定的准备行动,将事件规划和恢复测试等行动列为优先事务。 {{textInsert09}}

恢复 

评估的第三个也是最后一个部分重点关注恢复功能的完整性。即,贵组织为及时恢复所有数据并继续正常运营而采用的技术和流程。仅考虑这一方面,贵组织被评级为{{cat3Rating_cn}},在本评估中表示{{cat3Level_cn}}级别的准备情况。
  • 安排合适的人员来完成从网络攻击恢复至关重要。 {{textInsert10}}
数字 2

来源: ESG

  • 我们询问,您认为在发生攻击时您的数据能够恢复多少。  {{textInsert11}}
  • 本评估提到贵组织在分隔或安全隔离的基础架构上进行投资以创建关键数据的副本。{{textInsert12}}
  • 最后,无论贵组织是否具有隔离的基础架构,我们都询问您认为在这种类型的环境中应保护的数据量有多少。  {{textInsert13}}

Dell Technologies 如何提供帮助

Dell Technologies 致力于建立信任和安全的互联世界。我们孜孜不倦地工作,通过将网络弹性和安全功能端到端设计到我们的所有产品、解决方案和服务中,致力于确保您的数据、网络、组织和客户的安全成为重中之重。从 Dell Endpoint Security 解决方案和 VMware Carbon Black Cloud 到戴尔可信设备和 Dell EMC PowerProtect Cyber Recovery 数据避风港,我们可以帮助您创建和维护一个安全且富有弹性的组织,即使出现新的威胁。 

 

根据您的评估和当前的得分,我们提供了具有优先顺序的建议来帮助您提高弹性。通过我们的安全和信任中心,您可以轻松访问更多的资源和解决方案,以帮助您快速地找到您的消费者客户和企业遇到的安全问题的解答。 

 

从边缘到核心再到云,我们的行业专家可以提供战略性指导和经验证的实用功能来帮助您保护业务,以及保护您的声誉免受网络威胁的损害 — 请相信 Dell Technologies。 

戴尔如何帮助您提高检测能力:
戴尔如何帮助您提高应对能力:
戴尔如何帮助您提高从攻击恢复的能力:
ESG, a division of TechTarget 是一家 IT 分析、研究、验证和战略公司,致力于为全球 IT 社区提供市场资讯和可行见解。
© 2021 TECHTARGET, INC. ESG, A DIVISION OF TECHTARGET, SUITE 1-150, 275 GROVE STREET, NEWTON, MA 02466 | 508.482.0188
Overall Score = {{overallScore}}
Overall Rating = {{overallRating}}

CATEGORY 1 - DETECT
1. Which of the following types of threats will you and your team spend the most time preparing for over the next 12 months?
Answer01 = {{q1}}
Counter = {{q1counter}}

2. How confident are you that you are satisfying your regulatory/compliance mandates (e.g., GDPR, PCI DSS, FINRA, FISMA, HIPAA, etc.)? (please check one)
Answer02 = {{q2}}

3. For how long (if at all) has your organization leveraged a framework to guide and measure your security program (e.g., NIST CSF, ISO 27001, CIS Critical Security Controls, etc.)? (please check one)
Answer03 = {{q3}}

4. How confident are you that you have the appropriate visibility and threat detection within your endpoint, cloud, and network infrastructure? (please check one)
Answer04 = {{q4}}

5. What staffing strategy do you utilize for detection and response of cyber-attacks? (please check one)
Answer05 = {{q5}}

6. How confident are you that your organization is scanning or testing for vulnerabilities regularly enough and remediating them by patching or configuration updates in a timely fashion? (please check one)
Answer06 = {{q6}}

7. How confident are you that appropriate security controls are widely deployed, properly configured, and capable of preventing a ransomware attack? (please check one)
Answer07 = {{q7}}

Category 1 Score = {{cat1Score}}
Category 1 Rating = {{cat1Rating}}

CATEGORY 2 - RESPOND
8. If your organization experiences a successful ransomware attack, how will you most likely remediate the threat to impacted applications and data? (please check one)
Answer08 = {{q8}}

9. Beyond the impact ransomware could have on production data and operations, how much budget, time, and effort is your organization putting toward protecting copies of data (backups/snapshots/replication)? (please check one)
Answer09 = {{q9}}

10. How prepared do you feel in your ability to respond to a ransomware or cyber attack that causes a significant disruption to your business? (please check one)
Answer10 = {{q10}}

11. What incident preparedness activities has your organization engaged in within the past 12 months? (please check all that apply)
Answer11 = {{q11}}

Category 2 Score = {{cat2Score}}
Category 2 Rating = {{cat2Rating}}
 

CATEGORY 3 - RECOVER
12.Thinking about your IT team and colleagues, how would you rate your collective skillset to recover from a ransomware or other cyber attack resulting a data destruction event? (please check one)
Answer12 = {{q12}}

13. Thinking about your last data recovery effort relating to a ransomware or cyber incident, how successful was your team/staff recovering data? (please check one)
Answer13 = {{q13}}
Selected E = {{q13e}}

14. Do you believe your organization would be able to recover all data, objects, file systems in a non-corrupted state after a disruptive cyber event/attack? (please check one)
Answer14 = {{q14}}

15. Does your organization currently have the capability to isolate or “air gap” some of its protection storage capacity to prevent malware infections? (please check one)
Answer15 = {{q15}}

16. What type of providers have or would you most likely turn to for help and guidance when evaluating solutions to isolate or “air gap” protection storage capacity to prevent malware infections? (please check all that apply)
Answer16 = {{q16}}

17. Regardless of your organization’s current utilization of an isolated protection capacity today, what percent of all your organization’s business-critical applications do you believe should be protected by a solution which can ensure there is always a copy of uncompromised data from which your organization can restore? (please check one)
Answer17 = {{q17}}

18. Thinking about your overall ability to remediate and recover from a cyber-security event, how would you assess your organization’s overall capabilities in the following areas? (please check one per row)
Answer18-1 = {{q18}}
Answer18-2 = {{q19}}

Category 3 Score = {{cat3Score}}
Category 3 Rating = {{cat3Rating}}
 

url = {{url}}