Let’s understand your security operations needs
🎯 What's Your Biggest Pain Point? (Check all that apply)
Drowning in alerts - too much noise, can't find real threats No context - alerts come in but we don't know what to do
Slow response - takes us hours/days to investigate and act
Coverage gaps - lack of resources / skills gap to handle alerts 24/7
Can't prove value - no metrics on how we're performing
Tool overload - too many dashboards, nothing talks to each other Others (please specify) 🔧 What Security Tools Do You Have? (Check all that apply)
Endpoint Protection
Others (Please list all that matters for your business) - Firewall/Network
Others (Please list all that matters for your business) - Cloud & Identity
Others (Please list all that matters for your business) - Web & Email Security
Others (Please list all that matters for your business) - SIEM or SOAR or Log Management
Others (Please list all that matters for your business) - Ticketing & Workflow
Others (Please specify) - 📊 Environment Size (Rough estimates are fine)
Number of users:
Less than 1,000 (Please specify) Number of devices/endpoints:
Less than 1,000 (Please specify) Where is your infrastructure?
Mostly cloud (Please specify cloud providers e.g. AWS, Azure, GCP, others) Mostly on-premises data centers 📈 Alert & Data Volume
How many security alerts do you get per day? (Rough estimate)
More than 2,000 (Please specify)
Of those alerts, how many are actually real threats?
Do you know your daily log/data volume?
More than 2TB/day (please specify)
How long do you need to store security data?
1 year or more (Please specify)
🏢 Asset Criticality & Context
Do you have a way to identify which assets are most critical?
(e.g., Business Impact Assessment, Asset inventory with criticality ratings)
Yes - we have documented asset criticality Partially - we know some critical systems but not all No - everything is treated the same
If yes, where is this information?
CMDB / Asset management system Business Continuity plan Risk management framework Other (Please specify)
What additional context would help your team respond faster? (Check all that apply)
Internal Context
Asset criticality (which systems matter most) User profiles (department, role, manager) Device profiles (OS, patch level, owner) Historical baselines (is this normal for this asset?) Other (Please specify) External Threat Intelligence
File/hash reputation lookups MITRE ATT&CK technique mapping Threat actor attribution Other (Please specify)
⚠️ Which Threats Matter to Your Business Most and/or are keeping you up at night? (Pick your top 5)
Ransomware / malware on endpoints Account takeovers and suspicious logins Phishing and business email compromise Web application attacks (SQL injection, etc.) Insider threats and data leaks Cloud misconfigurations Network scanning and unauthorized access Others (please specify)
🔬 Triage & Analysis Approach
Do you have existing analysis playbooks for common security scenarios?
Yes - we have documented playbooks we'd like to use Some - we have playbooks for a few scenarios No - we'd like to use HM's standard playbooks
If you have playbooks, would you want us to follow them?
Yes - follow our existing playbooks Use HM's playbooks as a starting point, we'll adapt Just use HM's standard playbooks
⏱️ Response Time & SLA Requirements
How quickly do you need us to respond? (Target SLAs)
Time to Detect (acknowledge we received the alert):