Skip survey header

IBM Security - Data Security Survey

The IBM Security team is looking for your insights on how your organization prepares for data security in context of your IT security practices. Please answer the questions below to the best of your ability.

Your answers will not shared outside of IBM Security.


This survey will take approximately 8 minutes. 
2. What is your company revenue? *This question is required.
3. In what locations does your company operate? Select all that apply.  *This question is required.
4. What is the primary industry for your company? *This question is required.
5. For your organization, what is your current IT security budget? *This question is required.
6. What is your organization's current containerization strategy? Select all that apply. *This question is required.
7. Which of these data security or compliance tools does your organization use? Select all that apply. *This question is required.
8. For these data security use cases, how satisfied are you using your existing data security tools? *This question is required.
Not satisfied
 
Highly satisfied
Insider threats
Threat hunting
Regulatory compliance
Discovery & Classification
User behavior analysis of structured data
User behavior analysis of unstructured data
Data protection (Encryption)
Collaboration with IT Security / Security Operations Center
9. For these data security use cases, does your organization plan on investing more or less? *This question is required.
Decrease investment
Maintain current investment
Increase investment
Insider threat
Threat hunting
Regulatory compliance
Discovery & Classification
User behavior analysis of structured data
User behavior analytics of unstructured data
Data protection (Encryption)
Collaboration with IT Security / Security Operations Center
10. How do you prefer to purchase IT security tools? *This question is required.
11. Please rank order the following qualities in order of priority for your IT security needs.
1 = top priority, 8 = lowest priority
*This question is required. Note: for the following table each column is restricted to a single answer across all rows.
12345678
12. How does your organization deploy IT security software? *This question is required.