NGAF Current Firewall & Security What type of firewall do you
Infrastructure currently have in place? Are you satisfied with the current capabilities and effectiveness of your existing firewall solutions?
What additional security
technologies or tools are you using alongisde your firewall?
How old if your current firewall?
Is your license about to expire? Security Requirements and What are your specific security Threat Landscape requirements and concerns in terms of network protection?
How are you addressing evolving
threats and attack vectors within your network?
Application Control and How well do you currently monitor
Visibility and control application usage within your network?
Do you have visibility into
application-level activities and the ability to enforce granular policies based on applications?
Are you facing challenges related to
controlling or blocking unauthorized applications?
Advanced Threat Are you interested in enhancing your
Detection and Prevention security posture with advanced threat intelligence and detection features?
What measures do you have in place
to detect and prevent advanced threats, such as malware, zero-day attacks, or command and control communications?
Network Performance and How does your existing firewall
Scalability infrastructure impact network performance, throughput and latency? Can your current firewall scale to accommodate increasing network traffic and bandwidth requirements?
Are you experinceing any
performance bottlenecks or limitations with your current firewall setup? Question Topic Questions to ask HCI Current Infrastructure Can you describe your existing server, storage, and networking infrastructure?
How do you currently manage and
provision compute, storage, and networking resources?
Are you facing any challenges or
limitations with your current infrastructure that impact performance, scalability, or management?
Scalability and Growth What are your projected growth
plans for the organization in terms of data storage and computing requirements?
How easily can your current
infrastructure scale to meet future needs?
Are you experiencing difficulties in
adding or managing new resources as your needs evolve?
Performance and Resource How well are you utilizing your
Utilization existing compute and storage resources?
Are there any performance
bottlenecks or resources contention issues that impact application or service delivery?
Do you have visibility into resource
usage and the ability to optimize resource allocation based on workload demands?
Data Protection and How are you currently handling data
Disaster Recovery protection, backup, and disaster recovery?
Are you satisfied with the current
backup and recovery times and processes?
Do you have a disaster recovery plan
in place, and how confident are you in its effectiveness? Management and How do you manage your Complexity infrastructure components (servers, storage, networking) in terms of provisioning, updates, and monitoring?
What are the administrative
complexities involved in managing your current infrastructure?
Are you looking for ways to simplify
management and streamline operations?
Cost and ROI Have you evaluated the total cost of
ownership (TCO) and return on investment (ROI) of your existing infrastructure?
Are you interested in exploring
potential cost savings or improved cost predictability with a different infrastructure approach? Question Topic Questions to ask Cyber Commande Current Security Measures What security measures and tools do you currently have in place to monitor and detect network threats?
Are you satisfied with your existing
security solutions in identifying and responding to network based attacks?
Network Visibility How much visibility do you have into
your network traffic, including inbound and outbound communications, data flows, and interconnections?
Do you have real-time visibility into
network events and activities, or is there a delay in detecting and resposding to potential threats?
Threat Detection and What is your current process for
Incident Response detecting and investigating security indidents within the network?
How quickly can you identify and
respond to network based threats, such as malware infections, suspicios activity, or data exfiltration attempts?
Scalability and Can your current security
Performance infrastructure scale to handle increasing network trafic and evolving threats effectively?
How does your exisiting security
setup impact network performance and bandwidth utilization?
Security Monitoring and Do you have dedicated personnel or
Alerting teams responsible for monitoring and analyzing network security events and alerts?
How are security alerts triaged,
investigated, and responded to within your organization? Compliance and Are you subject to any specific Regulatory Requirements compliance regulations or industry standards that require network monitoring and threat detection?
Do you have the necessary
resources, both in terms of personnel and technology, to implement and manage an NDR solutions effectively? Question Topic Questions to ask HCI Current Desktop What is your current desktop Infrastructure infrastructure setup? Are you using physical desktops or traditional desktop virtualization solutions?
How do you manage and maintain
desktop images, software updates and user configurations?
Are you facing any challenges or
limitations with your current desktop environment that impact performance, scalability, or management?
Remote Access and Are there requirements for enabling
Mobility remote access to desktops or supporting a mobile workforce?
How do you currently address
remote access needs or provide desktops to users in different locations?
Are there security concerns of
compliance requirements related to remote access and mobility?
Performance and Resource How well are you utilizing your
Utilization existing compute and storage resources?
Are there any performance
bottlenecks or resources contention issues that impact application or service delivery?
Do you have visibility into resource
usage and the ability to optimize resource allocation based on workload demands?
Data Protection and How are you currently handling data
Disaster Recovery protection, backup, and disaster recovery?
Are you satisfied with the current
backup and recovery times and processes? Do you have a disaster recovery plan in place, and how confident are you in its effectiveness?
Management and Are you subject to any specific
Complexity compliance regulations or industry standards that require network monitoring and threat detection?
Do you have the necessary
resources, both in terms of personnel and technology, to implement and manage an NDR solutions effectively? Question Topic Questions to ask IAG Bandwidth or Traffic What is your current solution for Management network traffic shaping and prioritization?
How does the solution measure and
control bandwidth usage for differenct applications or user groups?
What additional security
technologies or tools are you using alongisde your firewall?
Encrypted Traffic Visibility What are your specific security
requirements and concerns in terms of network protection?
How are you addressing evolving
threats and attack vectors within your network?
Application Control and How well do you currently monitor
Visibility and control application usage within your network?
Do you have visibility into
application-level activities and the ability to enforce granular policies based on applications?
Are you facing challenges related to
controlling or blocking unauthorized applications?
Unified Network-Wide Are you interested in enhancing your
Management of All Clients security posture with advanced threat intelligence and detection features?
What measures do you have in place
to detect and prevent advanced threats, such as malware, zero-day attacks, or command and control communications?
Web Access Control How do you currently control and
manage web access for your users? Do you have policies in place for restricting access to certain websites or categories of websites?
Are you facing challenges related to
managing and enforcing web access policies?
Threat Protection and What measures do you have in place
Filtering to protect against web-based threats, such as malicious URLs, downloads or drive-by-downloads?
Are you interested in enhancing your
web security with features like URL filtering, content inspection, or malware detection?
Data Loss Prevention How do you currently handle data
loss prevention measures for web traffic?
Are you able to enforce policies to
prevent sensitive data from being transmitted over the web?
Do you have visibility into potential
data leakage incidents through web channels?
User Authentication and How do you autenticate and
Access Control authorize users accessing the web within your organization?
Are you interested in integrating
user authentication with your SWG solution for granular access control?
Do you have remote or mobile users
who require secure web access?
Reporting and Compliance How do you currently monitor and
report on web usage and security incident?
Are you able to generate reports on
web traffic, blocked websites, and user activities?