Find Out Your Zero Trust Cloud Security Status 1. Are you compliant with NIST 800-207 standards? YesNoPartiallyNot Applicable 2. How do you safeguard against threats to the following: a. Human credentials (users, privileged users)? Multifactor authenticationPassword policiesUser behavior analyticsOthers b. Non-human credentials (service accounts)? Credential rotationLeast privilege accessCredential vaultingOthers c. The identity store (e.g., Active Directory protocol attacks)? Intrusion detection systemAccess control listsAnomaly detectionOther (please specify): 3. Do you employ a risk-based policy approach for Zero Trust? YesNoNot Sure 4. What data types can you process in real time without generating extensive log files? Network traffic dataApplication usage dataSecurity event dataOthers 5. Do your capabilities extend beyond Zero Trust Network Access? YesNo 6. Besides Zero Trust Network Access, can you extend your Zero Trust platform to support my existing vendors and investments? Yes, we can integrate with existing vendors and investments.No, we are limited to Zero Trust Network Access.Partially, with limitations 7. How do you protect against unmanaged systems or legacy systems? Network segmentationEndpoint detection and responseZero Trust policies for unmanaged systemsOthers To get your assessment results kindly provide your email address: