Identify

100%

Protect

100%

Detect

50%

Respond

0%

Recover

0%
66%

Detect

Do you use intrusion detection systems to detect any anomalous behaviour on your network?