Convert Insight To Action
Improve Your Performance
Optimize Your Success
Explore Our Collection
Scroll Through Our Blog
Find Out More
Welcome to the 2112 Security Scope, an exclusive tool for helping you understand your managed security services capabilities and performance relative to your peers and the channel at large.
By collecting answers to a few questions about your company and its approach to information security, the 2112 Security Scope diagnostic will generate a comprehensive report on how your company compares to others of comparable size and scope in the five functional areas of the NIST Cybersecurity Framework Core. All information provided is confidential, and you can evaluate your services practice through the 2112 Security Scope tool as often as you like.
The 2112 Security Scope is supported by The 2112 Group and Ingram Micro. We’re committed to helping businesses like yours build efficient, effective, and profitable managed security services practices.
Now let’s get started and create your profile.
Function One: Identify
Assessing and managing risk lies at the heart of any effective information security program. Before you can determine what controls to implement, you must understand the real-world risk profiles and tolerances of the clients you protect. The Identify function helps you better understand and manage cybersecurity risks to systems, people, assets, data, and capabilities.
On a scale of zero to 10 with 10 being best, rate your organization’s performance on the following risk and threat identification tasks.
Function Two: Protect
High-profile security breaches underscore the importance of mastering the elements of the Protect function, which outlines appropriate safeguards to ensure delivery of critical infrastructure services and supports the your ability to limit the impact of a cybersecurity event.
On a scale of zero to 10 with 10 being best, rate your organization’s performance on the following data and systems protection tasks.
Function Three: Detect
The Detect function guides your efforts to develop the policies and procedures you need to identify the occurrence of a cybersecurity event. Security data analysis and threat detection are key to catching system compromises early and mitigating the effects of an intrusion.
On a scale of zero to 10 with 10 being best, rate your organization’s performance on the following threat detection tasks.
Function Four: Respond
Well-rounded incident-response processes can minimize operational disruptions, shorten recovery, and reduce total cost in the wake of suffering a major breach. The Respond function guides the development and implementation of activities to take when a cybersecurity incident is detected.
On a scale of zero to 10 with 10 being best, rate your organization’s performance on the following incident response tasks.
Function Five: Recover
In the wake of an attack, a reliable, security-focused backup and recovery process is required to repair damage and return the client’s business to a stable, working state. The Recover function deals with the development and maintenance of plans for resilience and procedures to restore data and services impaired by an incident.
On a scale of zero to 10 with 10 being best, rate your organization’s performance on the following attack and data loss recovery tasks.
We're almost done. We just need some contact information, in order to deliver your customized 2112 Security Scope report.
Enter your name and e-mail address below to receive your security practice assessment. You can use the 2112 Security Scope as often as you like to track your progress as your practice matures.
The 2112 Group is committed to your privacy and does not share or sell your contact information to third parties. For more information about how we use and safeguard your data, please see our privacy and data protection policy.