Lookout Logo

Mobile Risk Assessment

In this 2 minute survey, we’ll learn about your organization’s mobility situation by asking questions about data access on smartphones and tablets, as well as any existing controls you’ve already put in place. We’ll then generate your customized Mobile Risk Assessment, showing clear steps your organization can take to mitigate business and compliance risk.

Get Started
1
Basic Information
2
Mobile Data Access
3
Mobile Device Management
4
Threat Protection
5
Vulnerability
6
Risky Behaviors & Configuration
1
2
3
4
5
6
Basic Information

Tell us a bit about your organization

2
3
4
5
6
Mobile Data Access

Do your employees have access to the following assets on mobile devices today (or in the near future):

3
4
5
6
Unified Endpoint Management (UEM) / Mobile Device Management (MDM)
i.e., mobile devices are required to have an UEM or MDM solution installed, such as WorkspaceONE, Ivanti (MobileIron), Microsoft Intune, MaaS360, or BlackBerry UEM
4
5
6
Threat Protection
Note: Mobile Device Management solutions cannot detect mobile threats, such as mobile phishing, malicious apps, risky wifi networks, or advanced attacks on the device.
5
6
Vulnerability Protection
(not detected by Mobile Device Management)
6
Risky Behaviour and Configurations
Note: These pose a significant compliance risk if not addressed (not detected by MDM).
Thank you for completing the survey. We’ve calculated your results based on your responses. Please enter your details below to receive a copy of your custom report.
Thank you! Generating Report....
Privacy Notice
If you’d like to see what we do with this information, please see our Privacy Notice
Oops! Something went wrong while submitting the form.