Overall we score your organization as:

{{overallRating}}

When it comes to proactively protecting your organization with detection best practices, you are rated as:
{{cat1Rating}}


Watch video for summary.

When it comes to responding quickly and effectively to a cyber incident to limit the damage / negative impact you are rated as:
{{cat2Rating}}

 

Watch video for summary.

When it comes to recovering your data and resuming operations after a cyber incident, you are rated as:
{{cat3Rating}}

 

Watch video for summary.

Your Customized Cyber Resiliency Report

Thanks for taking the Dell Technologies Cyber Resiliency self-assessment powered by ESG. The goal of this assessment is to help you understand how vulnerable your organization is to ransomware and other sophisticated cyber-attacks today, identify areas of vulnerability, and explain what you can do to address these risks. To do so, we evaluate your organization’s preparedness in three key areas: proactive threat detection, agile threat response, and completeness of recovery capabilities.
Based on your responses to the assessment across each of these areas, we categorize your organization as {{overallRating}}. This is the {{overallLevel}} tier of preparedness in this assessment. The following pages detail why your organization received this rating and include recommendations for your organization to consider.

Detection

The first pillar of the assessment focuses on proactive threat detection—that is, the technologies and processes in place at your organization to detect and prevent a cyber-attack or ransomware-related incident. Considering just this pillar, your organization was rated as {{cat1Rating}}, the {{cat1Level}} tier of preparedness in this assessment.
  • To begin the assessment, we asked about threats your team is focused on. This is important because as ESG’s 2020 spending intentions research showed, many organizations are under a constant barrage of ransomware and other forms of sophisticated cyber-attacks (see Figure 1). {{textInsert01}}
Figure 1. Frequency with which Organizations Face Ransomware Attacks

Source: Enterprise Strategy Group

  • We also asked you to consider your organization’s ability to meet its compliance mandates. {{textInsert02}}
  • The assessment touched on your organization’s use of risk frameworks to guide your security program.  {{textInsert03}}
  • Next, the assessment touched on endpoint, cloud, and network visibility. {{textInsert04}}
  • Finally, the assessment focused on the efficacy of controls in place to prevent a ransomware attack specifically. {{textInsert05}}

Response

The second pillar of the assessment focuses on agile threat response—that is, the technologies and processes in place at your organization to respond to a security or ransomware incident quickly, limiting its impact. Considering just this pillar, your organization was rated as {{cat2Rating}}, the {{cat2Level}} tier of preparedness in this assessment.
  • We asked you what your most likely response to a successful ransomware attack would be.  {{textInsert06}}
  • Next, we asked you how much time, effort, and budget you have allocated to protecting secondary data copies. {{textInsert07}}
  • When it comes to response preparedness, {{textInsert08}}
  • Getting to specific preparedness actions, the assessment prioritizes actions like incident planning and recovery testing. {{textInsert09}}

Recovery

The third and final pillar of the assessment focuses on completeness of recovery capabilities. That is, the technologies and processes in place at your organization to recover all your data and enable resumption of normal operations in a timely fashion. Considering just this pillar, your organization was rated as {{cat3Rating}}, the {{cat3Level}} tier of preparedness in this assessment.
  • Having the right people in place to recover from a cyber-attack is critical. {{textInsert10}}
Figure 2. Where Organizations Have Skill Gaps Today

Source: Enterprise Strategy Group

  • We asked how much of your data you believe you would be able to recover in the event of an attack. {{textInsert11}}
  • The assessment touches on your organization’s investment in isolated or air-gapped infrastructure for copies of critical data. {{textInsert12}}
  • Finally, regardless of whether your organization has isolated infrastructure, we asked how much of your data you think should be protected in that type of environment. {{textInsert13}}

How Dell Technologies Can Help

Dell Technologies strives to build trust and a secure, connected world. Together with your trusted partner, who knows your business needs, we work tirelessly to keep your data, network, organization and customers’ safety top-of-mind – with cyber resilience and security engineered end-to-end into all our products, solutions and services. Leveraging the expertise and proven Dell solutions, from Dell Endpoint Security solutions and VMware Carbon Black Cloud to Dell Trusted Devices and Dell EMC PowerProtect Cyber Recovery, we help you create and maintain a secure and resilient organization even as new threats emerge.

Based upon your assessment and current score we have made prioritized recommendations to help improve your resilience. Our Security and Trust Center provides easy access to additional resources and solutions to help you quickly find answers to your consumer and enterprise security questions.

From the edge, to the core, to the cloud―we collaborate with Dell to offer strategic guidance and proven practical capabilities to help you protect your business and preserve your reputation from cyber threats – Trust us, trust Dell Technologies.
How Dell can help you improve your detection capabilities:
How Dell can help you improve your ability to respond:
How Dell can help you recover from an attack:
ESG, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.
© 2021 TECHTARGET, INC. ESG, A DIVISION OF TECHTARGET, SUITE 1-150, 275 GROVE STREET, NEWTON, MA 02466 | 508.482.0188
Overall Score = {{overallScore}}
Overall Rating = {{overallRating}}

CATEGORY 1 - DETECT
1. Which of the following types of threats will you and your team spend the most time preparing for over the next 12 months?
Answer01 = {{q1}}
Counter = {{q1counter}}

2. How confident are you that you are satisfying your regulatory/compliance mandates (e.g., GDPR, PCI DSS, FINRA, FISMA, HIPAA, etc.)? (please check one)
Answer02 = {{q2}}

3. For how long (if at all) has your organization leveraged a framework to guide and measure your security program (e.g., NIST CSF, ISO 27001, CIS Critical Security Controls, etc.)? (please check one)
Answer03 = {{q3}}

4. How confident are you that you have the appropriate visibility and threat detection within your endpoint, cloud, and network infrastructure? (please check one)
Answer04 = {{q4}}

5. What staffing strategy do you utilize for detection and response of cyber-attacks? (please check one)
Answer05 = {{q5}}

6. How confident are you that your organization is scanning or testing for vulnerabilities regularly enough and remediating them by patching or configuration updates in a timely fashion? (please check one)
Answer06 = {{q6}}

7. How confident are you that appropriate security controls are widely deployed, properly configured, and capable of preventing a ransomware attack? (please check one)
Answer07 = {{q7}}

Category 1 Score = {{cat1Score}}
Category 1 Rating = {{cat1Rating}}

CATEGORY 2 - RESPOND
8. If your organization experiences a successful ransomware attack, how will you most likely remediate the threat to impacted applications and data? (please check one)
Answer08 = {{q8}}

9. Beyond the impact ransomware could have on production data and operations, how much budget, time, and effort is your organization putting toward protecting copies of data (backups/snapshots/replication)? (please check one)
Answer09 = {{q9}}

10. How prepared do you feel in your ability to respond to a ransomware or cyber attack that causes a significant disruption to your business? (please check one)
Answer10 = {{q10}}

11. What incident preparedness activities has your organization engaged in within the past 12 months? (please check all that apply)
Answer11 = {{q11}}

Category 2 Score = {{cat2Score}}
Category 2 Rating = {{cat2Rating}}
 

CATEGORY 3 - RECOVER
12.Thinking about your IT team and colleagues, how would you rate your collective skillset to recover from a ransomware or other cyber attack resulting a data destruction event? (please check one)
Answer12 = {{q12}}

13. Thinking about your last data recovery effort relating to a ransomware or cyber incident, how successful was your team/staff recovering data? (please check one)
Answer13 = {{q13}}
Selected E = {{q13e}}

14. Do you believe your organization would be able to recover all data, objects, file systems in a non-corrupted state after a disruptive cyber event/attack? (please check one)
Answer14 = {{q14}}

15. Does your organization currently have the capability to isolate or “air gap” some of its protection storage capacity to prevent malware infections? (please check one)
Answer15 = {{q15}}

16. What type of providers have or would you most likely turn to for help and guidance when evaluating solutions to isolate or “air gap” protection storage capacity to prevent malware infections? (please check all that apply)
Answer16 = {{q16}}

17. Regardless of your organization’s current utilization of an isolated protection capacity today, what percent of all your organization’s business-critical applications do you believe should be protected by a solution which can ensure there is always a copy of uncompromised data from which your organization can restore? (please check one)
Answer17 = {{q17}}

18. Thinking about your overall ability to remediate and recover from a cyber-security event, how would you assess your organization’s overall capabilities in the following areas? (please check one per row)
Answer18-1 = {{q18}}
Answer18-2 = {{q19}}

Category 3 Score = {{cat3Score}}
Category 3 Rating = {{cat3Rating}}
 

url = {{url}}