thales logo

Access Management Risk Assessment Tool

As your organization moves to the cloud, you become increasingly vulnerable to data breaches arising from compromised identities. Traditional security perimeters no longer provide the access security you need. Take this free assessment tool to learn where you are in your cloud adoption journey and how access security and authentication can help you on the way.

By taking the free assessment tool you will:

  • Better understand where you are in your cloud adoption journey
  • Get guidelines on the how to apply access security appropriate to your current stage of cloud adoption
  • Understand how to extend existing access security to the cloud

get started

thumb

IT Environment

Select the enterprise apps that are currently deployed, or that will be deployed in your organization.
Select all that apply

Solution vendors you may be using

VDI

Citrix logo VMware logo Amazon Web Services logo

VPN

Citrix logo Bluecoat logo Sonic Wall logo

PAM

Cyberark logo Wallix logo Thycotic logo

WAF

Barracuda logo Citrix logo Fortinet logo

Threat Intelligence

Fireeye logo Crowdstrike logo Fortinet logo

Total Infrastructure 00

Cloud Environment

Select the cloud services you are using, or will be using in your organization.
Select all that apply

Sensitivity of data stored in this cloud service

LowMediumHigh

Sensitivity of data stored in this cloud service

LowMediumHigh

Sensitivity of data stored in this cloud service

LowMediumHigh

Sensitivity of data stored in this cloud service

LowMediumHigh

Sensitivity of data stored in this cloud service

LowMediumHigh

Sensitivity of data stored in this cloud service

LowMediumHigh

Sensitivity of data stored in this cloud service

LowMediumHigh

Other

Sensitivity of data stored in this cloud service

LowMediumHigh

Total Cloud 00

Access Scenarios

Which use cases do you need to support?
Select all that apply

Network access

Remote VPN access

Access to cloud apps and services

Access to VDI environments

Total Scenarios 00

User Population

What type of users do you need to protect?
Select all that apply

Regular employees

Privileged users and admins

C-Suite (executives)

External Consultants

Total Population 00

Delivery Model

Where are most of your apps delivered?
Select all that apply

Cloud-based delivery
(SaaS, PaaS, IaaS)

On premises delivery

Private cloud

Total Delivery 00

Compliance

Which regulations do you need to comply with?
Select all that apply

GDPR

PCI DSS

HIPAA

Other

Total Compliance 00

Get Results

Results

Initial Stage

Intermediate Stage

Advanced Stage

score00

IT Environment

00

Cloud Environment

00

Access Scenarios

00

User Population

00

Delivery Model

00

Compliance

00

Access Management Evaluation

Download Full Report

Edit your answers

thumb

Get your full report

  • Find out your readiness
  • Get a high level summary of your results
  • Download a PDF of your results