Resume session
Would you like to resume where you left off?
Yes
No
SSE Maturity
Assessment
Answer 15 questions to get tailored insights and expert recommendations
Question 1 of 15
1. How extensive is your enterprise's global presence?
In 1-9 countries
In 10+ countries
OK
2. What is the size of your enterprise workforce?
Less than 5000
5001-10,000
Over 10,000
OK
3. Where are your enterprise applications currently hosted?
Completely cloud-native, all workloads in the cloud
Mostly hosted on public clouds, connected via the internet
Hybrid: business-critical/customer-facing apps in public cloud, rest in our data center
Currently using a private data center, open to public cloud migration
All in our Data Center, no plans to change
OK
4. Describe your enterprise’s approach to SaaS.
High SaaS adoption with full visibility and control over SaaS apps
Limited visibility, no investment in tools for complete visibility and control
Not using SaaS or not relevant
OK
5. How agile is your connection to newly onboarded cloud applications?
Immediate connectivity ensured through our centralized service edge solution
Through Managed Security Service Provider (MSSP) private cloud
Manual extension needed
OK
6. How granular is your control overshadow IT, sanctioned SaaS, and Web applications?
Early adopters of Cloud Access Security Broker (CASB), and we have full control for shadow IT, sanctioned SaaS, and web applications
Recent deployed Cloud Access Security Broker (CASB) to gain full control for shadow IT, sanctioned SaaS, and web applications
Partial control for shadow IT, sanctioned SaaS, and web applications
No control over shadow IT, sanctioned SaaS, and web applications
OK
→
SSE Maturity
Assessment
Answer 15 questions to get tailored insights and expert recommendations
Question 5 of 15
7. What remote working policies are in place for your enterprise?
Enabled flexible working policies for the entire workforce
Available for pre-defined employees only
Most employees work in-office, remote working not applicable
OK
8. How do you enable secure access to private applications?
Early adopters of unified user-based policy management
Leveraging Integrated Identity Provider (IDP), with user-based policies tailored for each device separately
No user-based policies for remote users
OK
9. How are network and security functions organized?
Report to a common head, enabling unified decision-making
Separate and siloed teams, varying in design and decisions
Unified, network & security teams empowered to manage secure access
OK
10. What's your current enterprise security model?
Completely transitioned to cloud-based security via SSE
All security functions migrated to the cloud
Partial cloud transition, some functions like Proxy, Intrusion Prevention System (IPS) are on-premises
Fully on-premises
OK
←
→
SSE Maturity
Assessment
Answer 15 questions to get tailored insights and expert recommendations
Question 10 of 15
11. How do you manage network and security?
In-house teams manage both network and security
Single Managed Security Provider (MSSP) for both
Completely outsourced to multiple partners
One in-house, the other outsourced
OK
12. What components are up for renewal in the next 12 months?
VPN concentrator
Proxy solution
Threat protection
None
OK
13. Describe about your current Web control?
We are early adopters of cloud-based proxy solution for both office and remote users
We have deployed on-premises web control for both office and remote users but are looking to transition to cloud based in future
Office users will access internet via on-premises Proxy, but remote users can access open internet
OK
14. How prepared is your enterprise against known and unknown threats?
Early adopters of cloud-based intrusion and zero-day threat protection
Recently deployed cloud-based intrusion and zero-day threat protection
On-premises for both intrusion and zero-day threat protection, but considering cloud transition
On-premises for both intrusion and zero-day threat protection, no plans to change
Intrusion prevention only
No threat protection in place
OK
15. How is sensitive data protected from theft & leakages?
Early adopter of dedicated on-premises Data Loss Prevention (DLP) with custom policies
Recently deployed dedicated on-premises Data Loss Prevention (DLP)
Web and email traffic inspected via Internet gateway for blocking certain use cases
Partial Data Loss Prevention (DLP) capabilities, either web-based or email-based
No Data Loss Prevention (DLP) in place
OK
←
Submit
Ready to assess your organization's SSE maturity?
Complete a short form to get your personalised report
Select Industry*
Associations, Clubs & Membership
Aviation
BFSI
BPO
Conglomerate
Construction, Infrastructure & Real Estate
Education
Financial
Government
Hospitality & Travel
Information Technology
IT Enabled Services (ITES)
Transportation & Logistics
Manufacturing
Media & Entertainment
Professional Services
Services
Telecom
Trade
Utility
Others
Select Designation*
C-level
Vice President level or equivalent
Director level or equivalent
Manager level or equivalent
Select Country*
India
Australia
Bangladesh
Cambodia
China
Fiji
French Polynesia
Guam
Hong Kong
Japan
South Korea
North Korea
Laos
Malaysia
Micronesia
Myanmar
New Zealand
Pakistan
Singapore
Taiwan
Thailand
Vietnam
Philippines
Indonesia
Brunei
United Kingdom
Germany
France
Switzerland
Austria
Belarus
Belgium
Bosnia and Herzegovina
Bulgaria
Croatia
Cyprus
Czech Republic
Denmark
Estonia
Faroe Islands
Finland
Georgia
Gibraltar
Greece
Guernsey
Hungary
Iceland
Ireland
Isle Of Man
Italy
Ivory Coast
Jersey
Jordan
Kuwait
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macedonia
Mauritius
Moldova
Monaco
Montenegro
Morocco
Netherlands
Norway
Poland
Portugal
Romania
San Marino
Sao Tome & Principe
Serbia
Slovakia
Slovenia
Spain
Sweden
Ukraine
Vatican City
Albania
Algeria
Andorra
Angola
Western Sahara
Yemen
Zambia
Zimbabwe (Rhodesia)
United Arab Emirates
Gabon
Kenya
Israel
Saudi Arabia
Bahrain
Qatar
Turkey
Oman
Jordon
Uganda
Tanzania
Benin
Botswana
Burkina Faso
Burundi
Cameroon
Cape Verde
Central African Republic
Chad
Comoros
Ethiopia
Egypt
Equatorial Guinea
Democratic Republic of the Congo
Eritrea
Djibouti
Gambia
Ghana
Guinea
Guinea-Bissau
Iran
Iraq
Libya
Madagascar
Malawi
Mali
Malta
Mauritania
Namibia
Niger
Nigeria
Palestine
Rwanda
Mozambique
Senegal
Somalia
South Africa
Sudan
Swaziland
Syria
Togo
Tunisia
United States
Puerto Rico (US)
Bahamas
United States Virgin Islands (US)
Canada
Barbados
Brazil
Mexico
Colombia
Argentina
Peru
Venezuela
Chile
Ecuador
Guatemala
Cuba
Bolivia
Haiti
Dominican Republic
Honduras
Paraguay
Nicaragua
El Salvador
Costa Rica
Panama
Uruguay
Jamaica
Trinidad and Tobago
Guyana
Suriname
Guadeloupe (France)
Martinique (France)
Belize
French Guiana
Saint Lucia
Curaao (Kingdom of the Netherlands)
Aruba (Kingdom of the Netherlands)
Saint Vincent and the Grenadines
Grenada
Antigua and Barbuda
Dominica
Bermuda (UK)
Cayman Islands (UK)
Greenland (Denmark)
Saint Kitts and Nevis
Sint Maarten (Kingdom of the Netherlands)
Turks and Caicos Islands (UK)
Saint Martin (France)
British Virgin Islands (UK)
Caribbean Netherlands (Kingdom of the Netherlands)
Anguilla (UK)
Saint Barthlemy (France)
Saint Pierre and Miquelon (France)
Montserrat (UK)
Falkland Islands (UK)
Select State*
Yes, I consent to receive occasional marketing communications including emails, messages or calls with updates on services, market trends, event and other information from Tata Communications and its authorized partners that may be of value to me. I can always
unsubscribe
. Tata Communications processes your personal information as described in the
Privacy Policy
Submit
Please wait...