Sales · Intake & Discovery

Prospect Intake

Prospect questionnaire, security self-assessment, and environment discovery — everything needed to build the proposal.

Prospect
Firm Type
Environment
Self-Assessment
Step 1 of 4
Prospect Information
Primary contact and firm details. This section can be filled by the prospect or the sales rep.
Step 2 of 4
Firm Type & Regulatory Profile
Select your primary firm type. This determines which regulatory and compliance questions appear next.
Step 3 of 4
IT & Cybersecurity Environment
Help us understand your current technology landscape. This information is used to scope a proposal and prepare for the security assessment.
Step 4 of 4
Security Readiness Self-Assessment
Rate your firm's current posture across six critical areas. 1 = no controls or visibility, 5 = fully enforced with evidence. Be honest — this helps us build a realistic proposal.
Firm-Level Governance
3
Written cybersecurity policies, incident response plan, board/executive reporting, vendor risk management, employee training program
No policiesDocumented & enforced
Endpoint Security
3
Device inventory, EDR/antivirus on every device, encryption enforcement, patch management, BYOD controls
No visibilityFull coverage & evidence
User & Access Controls
3
MFA enforcement, VPN/Zero Trust access, role-based permissions, offboarding process, privileged account management
No MFA / open accessMFA + ZTA everywhere
Network Security
3
Firewall configuration, network segmentation, intrusion detection, DNS filtering, wireless security
Flat network / no monitoringSegmented & monitored
Cloud Application Security
3
Microsoft 365 hardening, conditional access policies, data sharing controls, email authentication (SPF/DKIM/DMARC), Secure Score
Default configHardened & audited
Data Protection
3
Data classification, encryption at rest and in transit, DLP rules, backup testing, retention policies
No classificationClassified & encrypted
18
out of 30
Moderate Readiness — Gaps Likely