You are on page 1of 10

Question Topic Questions to ask

NGAF Current Firewall & Security What type of firewall do you


Infrastructure currently have in place?
Are you satisfied with the current
capabilities and effectiveness of your
existing firewall solutions?

What additional security


technologies or tools are you using
alongisde your firewall?

How old if your current firewall?


Is your license about to expire?
Security Requirements and What are your specific security
Threat Landscape requirements and concerns in terms
of network protection?

How are you addressing evolving


threats and attack vectors within
your network?

Application Control and How well do you currently monitor


Visibility and control application usage within
your network?

Do you have visibility into


application-level activities and the
ability to enforce granular policies
based on applications?

Are you facing challenges related to


controlling or blocking unauthorized
applications?

Advanced Threat Are you interested in enhancing your


Detection and Prevention security posture with advanced
threat intelligence and detection
features?

What measures do you have in place


to detect and prevent advanced
threats, such as malware, zero-day
attacks, or command and control
communications?

Network Performance and How does your existing firewall


Scalability infrastructure impact network
performance, throughput and
latency?
Can your current firewall scale to
accommodate increasing network
traffic and bandwidth requirements?

Are you experinceing any


performance bottlenecks or
limitations with your current firewall
setup?
Question Topic Questions to ask
HCI Current Infrastructure Can you describe your existing
server, storage, and networking
infrastructure?

How do you currently manage and


provision compute, storage, and
networking resources?

Are you facing any challenges or


limitations with your current
infrastructure that impact
performance, scalability, or
management?

Scalability and Growth What are your projected growth


plans for the organization in terms of
data storage and computing
requirements?

How easily can your current


infrastructure scale to meet future
needs?

Are you experiencing difficulties in


adding or managing new resources
as your needs evolve?

Performance and Resource How well are you utilizing your


Utilization existing compute and storage
resources?

Are there any performance


bottlenecks or resources contention
issues that impact application or
service delivery?

Do you have visibility into resource


usage and the ability to optimize
resource allocation based on
workload demands?

Data Protection and How are you currently handling data


Disaster Recovery protection, backup, and disaster
recovery?

Are you satisfied with the current


backup and recovery times and
processes?

Do you have a disaster recovery plan


in place, and how confident are you
in its effectiveness?
Management and How do you manage your
Complexity infrastructure components (servers,
storage, networking) in terms of
provisioning, updates, and
monitoring?

What are the administrative


complexities involved in managing
your current infrastructure?

Are you looking for ways to simplify


management and streamline
operations?

Cost and ROI Have you evaluated the total cost of


ownership (TCO) and return on
investment (ROI) of your existing
infrastructure?

Are you interested in exploring


potential cost savings or improved
cost predictability with a different
infrastructure approach?
Question Topic Questions to ask
Cyber Commande Current Security Measures What security measures and tools do
you currently have in place to
monitor and detect network threats?

Are you satisfied with your existing


security solutions in identifying and
responding to network based
attacks?

Network Visibility How much visibility do you have into


your network traffic, including
inbound and outbound
communications, data flows, and
interconnections?

Do you have real-time visibility into


network events and activities, or is
there a delay in detecting and
resposding to potential threats?

Threat Detection and What is your current process for


Incident Response detecting and investigating security
indidents within the network?

How quickly can you identify and


respond to network based threats,
such as malware infections, suspicios
activity, or data exfiltration
attempts?

Scalability and Can your current security


Performance infrastructure scale to handle
increasing network trafic and
evolving threats effectively?

How does your exisiting security


setup impact network performance
and bandwidth utilization?

Security Monitoring and Do you have dedicated personnel or


Alerting teams responsible for monitoring
and analyzing network security
events and alerts?

How are security alerts triaged,


investigated, and responded to
within your organization?
Compliance and Are you subject to any specific
Regulatory Requirements compliance regulations or industry
standards that require network
monitoring and threat detection?

Do you have the necessary


resources, both in terms of
personnel and technology, to
implement and manage an NDR
solutions effectively?
Question Topic Questions to ask
HCI Current Desktop What is your current desktop
Infrastructure infrastructure setup? Are you using
physical desktops or traditional
desktop virtualization solutions?

How do you manage and maintain


desktop images, software updates
and user configurations?

Are you facing any challenges or


limitations with your current desktop
environment that impact
performance, scalability, or
management?

Remote Access and Are there requirements for enabling


Mobility remote access to desktops or
supporting a mobile workforce?

How do you currently address


remote access needs or provide
desktops to users in different
locations?

Are there security concerns of


compliance requirements related to
remote access and mobility?

Performance and Resource How well are you utilizing your


Utilization existing compute and storage
resources?

Are there any performance


bottlenecks or resources contention
issues that impact application or
service delivery?

Do you have visibility into resource


usage and the ability to optimize
resource allocation based on
workload demands?

Data Protection and How are you currently handling data


Disaster Recovery protection, backup, and disaster
recovery?

Are you satisfied with the current


backup and recovery times and
processes?
Do you have a disaster recovery plan
in place, and how confident are you
in its effectiveness?

Management and Are you subject to any specific


Complexity compliance regulations or industry
standards that require network
monitoring and threat detection?

Do you have the necessary


resources, both in terms of
personnel and technology, to
implement and manage an NDR
solutions effectively?
Question Topic Questions to ask
IAG Bandwidth or Traffic What is your current solution for
Management network traffic shaping and
prioritization?

How does the solution measure and


control bandwidth usage for
differenct applications or user
groups?

What additional security


technologies or tools are you using
alongisde your firewall?

Encrypted Traffic Visibility What are your specific security


requirements and concerns in terms
of network protection?

How are you addressing evolving


threats and attack vectors within
your network?

Application Control and How well do you currently monitor


Visibility and control application usage within
your network?

Do you have visibility into


application-level activities and the
ability to enforce granular policies
based on applications?

Are you facing challenges related to


controlling or blocking unauthorized
applications?

Unified Network-Wide Are you interested in enhancing your


Management of All Clients security posture with advanced
threat intelligence and detection
features?

What measures do you have in place


to detect and prevent advanced
threats, such as malware, zero-day
attacks, or command and control
communications?

Web Access Control How do you currently control and


manage web access for your users?
Do you have policies in place for
restricting access to certain websites
or categories of websites?

Are you facing challenges related to


managing and enforcing web access
policies?

Threat Protection and What measures do you have in place


Filtering to protect against web-based
threats, such as malicious URLs,
downloads or drive-by-downloads?

Are you interested in enhancing your


web security with features like URL
filtering, content inspection, or
malware detection?

Data Loss Prevention How do you currently handle data


loss prevention measures for web
traffic?

Are you able to enforce policies to


prevent sensitive data from being
transmitted over the web?

Do you have visibility into potential


data leakage incidents through web
channels?

User Authentication and How do you autenticate and


Access Control authorize users accessing the web
within your organization?

Are you interested in integrating


user authentication with your SWG
solution for granular access control?

Do you have remote or mobile users


who require secure web access?

Reporting and Compliance How do you currently monitor and


report on web usage and security
incident?

Are you able to generate reports on


web traffic, blocked websites, and
user activities?

Do you require complaince reporting


for auditing purposes?

You might also like