Mark your spot.

Plot your organization to compare your security approach to your peers. Provide your email for a chance to win a $250 AMEX gift card!

Get Started

The Data Security Quadrant How Secure is your data today?

View quadrant definitions
How it works:

The Data Security Quadrant tracks real-time trends in enterprise data protection. Your participation helps improve data security awareness for your organization and the industry as a whole.

Where do you fit?
Note: All quadrant information is anonymous.

Who we are: K logix is the leading data security company. We protect the information that drives your business.

Learn More

Step 1: How do you react to the scenarios below?
Step 2: Tech or Policy focused? Plot yourself.

Where Do You Fit?

Think about your data security. Here are some sample scenarios to get you thinking

An employee sends PII over Gmail from Starbucks.

  • Are there data handling standards preventing this?
  • Do you have the technology in place to stop this breech?

A hacker penetrates a database housing critical IP.

  • Do you have procedures in place to react effectively?
  • Will your security infrastructure alert you of this?

A financial contractor leaves the company.

  • Are there procedures for revoking his access?
  • Do you have technology to ensure no data leaves with him?

Choose your location. Mouse over the quadrant and click on a square to plot yourself and add your comment to the chart. Please Note: All information is anonymous.

Which best describes you?

Where Does Your Organization Fit?

The Data Security Quandrant, explained.

Technology Driven: We do not know exactly where all our data is, and our organization does not have written policies governing data access, but we're comfortable the technology we've put in place will help protect it from threats.

Prepared: We have security standards and procedures and best of breed technologies to support them. But we know we must continuously evaluate risk and make smart decisions to keep pace with business transformation and emerging threats.

Exposed: Change comes so quickly and new threats to data appear all the time - we do not believe technology or policy can keep up.

Documented: Our data governance policies are documented and our users have been informed about how to appropriately handle data. We have not invested in technology to ensure these policies are followed.

Blog < >

04.23.14 | Our 5 Recommendations for Stopping Heartbleed On Your Systems Our expert security architects recommend the following so you c... Read More »

03.24.14 | Ken Smith Recaps the RSA Conference Ken Smith reviews highlights from the RSA Conference 2014... Read More »

03.24.14 | Businessweek Examines Credit Card Data Security – Compliance Does Not Mean Security Two big mistakes many companies make - relying too heavily on standar... Read More »

03.24.14 | InformationIsBeautiful.Net InfoGraphic on Data Breaches Gives Perspective We were struck by this InformationIsBeautiful.Net infographic on the ... Read More »

03.24.14 | Tells Consumers To Take Some Responsibility for Data Security 80% of consumers rank data breaches as more annoying than the flu. 20... Read More »

view all entries  
< >

"eBook - 5 Tips To Optimize Performance and Functionality of Your Security Tools" Read the eBook - 5 Tips to Optimize Performance and Functional... Read More »

"K logix Spotlights Security Risk Analysis" A K logix Security Risk Analysis helps clients understand their... Read More »

"Ken Smith and Don Cook Join K logix" K logix is proud to announce that Ken Smith and Don Cook have j... Read More »

"Ken Smith on SANS Critical Control 9" Security Skills Assessment and Appropriate Training to Fill Gap... Read More »

"Dave Tasker Talks SANS Critical Security Control #8: Data Recovery Capability" Read More »

"Kevin Murphy Analyzes SANS Critical Security Control #7: Wireless Device Control" Read More »

"Dave Taskers Breaks Down SANS Critical Security Control #6: Application Software Security" Read More »

"K logix Names Rick Grimaldi Director of Technical Services; Company Grows 60% Over the Previous Year" K logix LLC, the leading data security company, today announced... Read More »

"News of the Week" View the K logix Weekly News Round Up, an overview of the most intere... Read More »

"Feats of Strength" Read the K logix newsmagazine profiling the latest data security tren... Read More »

"The Real Cost of Data Loss" The Real Cost of Data Loss is a report from K logix which defines the... Read More »

"Who Is Really Responsible To Protect America from Data Loss? " Kevin Pouche, K logix COO, is featured in SC Magazine. "There's... Read More »

"The Escalating Costs of Data Security Part 2" In this blog we present an alternative to our first argument (link) a... Read More »

"K logix in the Boston Business Journal" “The average organization spends 3.2 percent of revenue on info... Read More »

"K logix in - How American Businesses Are Giving Away Ideas to China" K logix COO Kevin Pouche's article on the dangers of poorly protectin... Read More »

"K logix in Action at Gibraltar Industries" “The value of working with K logix comes from their deep experi... Read More »

"How to Save 1.6% of Revenue - Follow up to my post" In quantifying the impact data loss has on nearly every company (1.6%... Read More »

"Data Loss Costs Company 1.6% of Revenue Annually" K logix proven research has found that the average company loses 1.6%... Read More »

"The Hundred Billion Dollar Problem.. " features K logix CEO Kevin West's article on the massive, ... Read More »

"K logix Introduces The K logix Data Security Quadrantâ„¢ on New Website " K logix, LLC, the leading data security company, today announced The ... Read More »

"Acushnet Company, Titleist Brand" “Whether the topic is DLP, or general security awareness, when ... Read More »

More Buzz  
< >

Our Methodology »  Discover, Monitor, Inform, Enforce -  Our methodology leverages best practices to ensure better data protection for our clients.

Why K logix » Experienced and honest data protection experts, a proven methodology and satisfied clients.

About Us » We are the leading data security company. We protect the information that drives your business. We incorporate proven best practices and technologies to safeguard your data against internal and external threats.

view all entries