Skip to content
Products & Services
Cloud
Endpoint Protection
Endpoint Detection and Response
Mobile Device Management
BYOD
Extended Detection and Response
Zero Trust Network Access
Data Privacy
On Prem
Endpoint Protection
Endpoint Detection and Response
Data Privacy
Platform
Malware Analysis Platform
Micro Business
SOHO Total Edition
Services
Threat Intel
Digital Risk Protection Services (DRPS)
Ransomware Recovery as a Services (RRaaS)
DPDP Compliance
Managed Detection and Response
Solutions
BFSI
Education
Government
Healthcare
ITeS
Manufacturing
Company
About Seqrite
Leadership
Award and Recognition
Newsroom
Partners
Partner Program
Locate Partner
Become A Partner
Support
Resources
Blogs
Whitepapers
Datasheets
Case Studies
Threat Reports
Manuals
PoV
Products & Services
Cloud
Endpoint Protection
Endpoint Detection and Response
Mobile Device Management
BYOD
Extended Detection and Response
Zero Trust Network Access
Data Privacy
On Prem
Endpoint Protection
Endpoint Detection and Response
Data Privacy
Platform
Malware Analysis Platform
Micro Business
SOHO Total Edition
Services
Threat Intel
Digital Risk Protection Services (DRPS)
Ransomware Recovery as a Services (RRaaS)
DPDP Compliance
Manage Detection and Response
Solutions
BFSI
Education
Government
Healthcare
Cybersecurity for the ITeS Industry
Manufacturing
Company
About Seqrite
Leadership
Awards & Certifications
Newsroom
Partners
Partner Program
Locate Partner
Become A Partner
Support
Resources
Blogs
Datasheets
Manuals
Case Studies
Whitepapers
Threat Reports
Policy
EULA
Contact Sales
Cybersecurity Maturity Assessment
Full Name
Email Address
(You will receive a report on this email address)
Organization
Number of Employees
Select Employees
5-100
101-1000
1001-3000
3001 Plus
Industry
Select Industry
Automobiles
BFSI
Charity & Social
Chemical Substance
Construction
Education
Energy & Utilities
Fashion and Accessories
Food Processing & Beverages
Government
Healthcare
Hospitality
IT/ITES
Manufacturing
Media
Professional Services
Telecommunications
Transport & Logistics
Designation
Select Designation
Administrator
Analyst
Assistant General Manager
Assistant Manager
Assistant Professor
Associate Vice President
Branch Executive
Business Development Manager
CEO
Chairman
Chief Growth Officer
Chief Privacy Officer
CIO
CISO
Cloud Engineer
Consultant
COO
Coordinator
CTO
Data Privacy Officer
Deputy General Manager
Deputy Manager
DevOps Engineer
Director
Engineer
General Manager
Head - Information Security
Head - IT
Human Resources
ICT Consultant
IT Admin
Lab Assistant
Manager - Enterprise Security
Manager - Security
Network Security Engineer
Operator
Owner / Proprietor
Research Scholar
Security Admin
Senior Executive
SOC Analyst
Software Development
Sr. Director
Sr. EVP & Chief Digital Officer
Sr. Manager
Sr. Vice President
Student
System Admin
Vice President
Other
People
Has your organization implemented the following measures to equip your employees to be the first line of defence?
Cybersecurity awareness and training for all employees
Cybersecurity practices and guidelines for daily operations
None of the above
Technology
Has your organization implemented the following measures to identify and secure all hardware and software assets?
Up-to-date inventory of all hardware and software including those on cloud instances (e.g. software and operating system used)
Unauthorized and EOS/EOL assets are replaced, and any in use before replacement are risk-assessed, monitored, and approved by senior management
Process to on-board new hardware and software into the organization
Hardware and software authorization dates are recorded in the inventory, and items without approval dates are removed
All confidential information is deleted before any hardware asset is disposed
None of the above
Data Security
Has your organization implemented the following measures to identify and protect the data you possess?
Up-to-date inventory of business-critical data
Process to protect your organization's business-critical data, e.g. password protection of document, encryption of personal data stored
Prevent employees from leaking confidential/sensitive data outside the organization e.g. disabling USB ports
Paper-based/hard copy media containing confidential/sensitive data are securely shredded
None of the above
Malware Protection
Has your organization implemented the following measures to protect systems and devices from malicious software like viruses and malwares?
Anti-malware solutions are installed and used in endpoints (i.e. laptop, mobile devices, servers)
Virus and malware scans are performed to detect possible cyberattacks
Anti-malware solutions are updated automatically to detect new malware (e.g. signature files)
Anti-malware solutions are configured to automatically scan the files upon access, including files downloaded from internet/emails/USB drive
Firewalls are deployed to protect networks, systems and endpoints, and network perimeter firewalls are configured to analyze and accept only authorised network traffic
Employees use only authorised software from official or trusted sources
Employees are aware of the use of trusted network connections for accessing organization’s data or business email, e.g. through corporate network or VPN
Employees are aware of the need to report any suspicious email/attachment or cybersecurity incidents to the IT team/senior management immediately
None of the above
Access Control
Has your organization implemented the following measures to restrict access to your data and services?
Manage and maintain the inventory of accounts, including users, administrators, third parties and service accounts
Approval process to grant and revoke access
Employees can access only the information and systems required for their job roles
Firewalls are deployed to protect networks, systems and endpoints, and network perimeter firewalls are configured to analyze and accept only authorised network traffic
Administrator accounts are only accessed to perform administrative functions with approval from management
Access for third parties or contractors are managed and restricted to only information/systems required for their job role, and removed when they no longer require the access
Third parties or contractors working with sensitive information are required to sign an NDA (non-disclosure agreement)
Physical access control is enforced to allow only authorised personnel to access the organization’s IT assets/environment
All default passwords are changed and replaced with strong passphrases
Accounts that have multiple failed login attempts are disabled/locked out
Account passwords are changed in the event of any suspected compromise
None of the above
Secure Configuration
Has your organization implemented the following measures on secure settings for all hardware and software assets?
Security configurations are enforced for all assets using industry recommendations and standards (e.g. CIS benchmarks)
Default, weak or insecure configurations are avoided or upgraded, e.g. changing default password, using HTTPS instead of HTTP, WPA2/WPA3 instead of WEP
Features, services or applications that are not in use are disabled or removed, e.g. file sharing services, FTP
Features, such as auto-connect to open networks and auto-run of non-essential programs are disabled
None of the above
Software Updates & Patch Management
Has your organization implemented the following measures on software update for systems and devices?
Patching all vulnerabilities irrespective of severity
Critical or important updates for operating systems and applications (e.g. security patches) are prioritised and applied as soon as possible
None of the above
Backup
Has your organization implemented the following measures to back up essential data and store them offline:
Business-critical systems and those containing essential business information (e.g. financial and business transactions) are identified and backed up regularly, including data stored in the cloud environment
Backups are protected from unauthorised access
Backups are stored separately (i.e. offline) from the operating environment
Longer term backups (e.g. monthly backups) are stored offline securely at an alternative location
None of the above
Incident Response
Has your organization put in place an incident response management system to detect, respond, and recover from cyber security incidents?
Up-to-date incident response plan that contains clear roles and responsibilities, procedures to detect/respond/recover from incidents, and communication plan and timeline to escalate and report to stakeholders (e.g. regulators, customers and management)
Employees who have access to the organization’s IT assets/environment are aware of the incident response plan
None of the above
Process
Does your organization periodically test its security processes to assess their effectiveness and make improvements?
Yes, the Cybersecurity processes are tested periodically and process is strengthened
Yes, the Cybersecurity processes are tested when it was introduced, but never revisited
The Cybersecurity processes are defined but not tested for effectiveness
The Cybersecurity processes are partially defined but not tested for effectiveness
None of the above
Threat Landscape
Has your organization experienced any cyber attack in the past 12 months?
Once
Several times a day
Several times a week
Several times a month
Not sure
Threat Landscape
Which of the following threats / incidents have you detected in the past 12 months?
Ransomware
Malware
Social Engineering attacks (Phishing, Vishing, Smishing, Shoulder Surfing etc)
Exploit of misconfigurations
Web Application attacks
Software / 0-day vulnerabilities
Insider threats
Spoofing
Identity-based attacks (Credential stuffing, Password spray, Brute-force, Identity impersonation, BEC etc)
Supply Chain attacks
AI/ML-powered attacks
IoT attacks
Threat Landscape
Has your organization experienced any business impact due to security incidents? If so, please select the types of impact encountered.
Business Disruption
Data Loss
Reputation Damage
Financial Loss
Incident Response cost
Regulatory implications
Intellectual Property / Trade secret loss
None of the above
Threat Landscape
What are the challenges you face in cyber security adoption?
Lack of knowledge / experience
Unlikely to be a target of cyber attacks
Lack of manpower / resources
Low priority for the organization
Low ROI for the business
Lack of budget
Lack of senior management support
None of the above
Technology
Does your organization leverage Cyber Threat Intelligence?
Yes, we consume threat intelligence (both Commercial Feeds and OSINT)
Yes, we consume OSINT feeds
None of the above
Technology
Does your organization perform Attack Surface Monitoring?
Yes, we perform continuous Attack Surface Monitoring
Yes, we perform Attack Surface Monitoring occassionally
No, we don't perform Attack Surface Monitoring
Cybersecurity Roadmap
What are your top three cyber security priorities for the upcoming year?
Threat Detection & Response
Cloud Security
Endpoint Security
Zero Trust Security
Employee Training
Regulatory Compliance
Data Protection
Network Security
Threat Intelligence
Incident Response
Mobile Security
Managed Security Services
Remote/Hybrid Security
24/7 Monitoring
Cybersecurity Roadmap
How likely are you to adopt AI-driven solutions for cyber threat defense in 2026?
Very likely
Somewhat likely
Unlikely
Cybersecurity Roadmap
What is your planned investment in cyber security tools and technologies for 2026?
Less than 5 lac
5 to 10 lac
10 to 25 lac
25 to 50 lac
50 to 75 lac
75 lac to 1 Cr
Above 1 Cr
Required fields
Submit Survey