Lookout Logo

Mobile Risk Assessment

In this 2 minute survey, we’ll learn about your organization’s mobility situation by asking questions about data access on smartphones and tablets, as well as any existing controls you’ve already put in place. We’ll then generate your customized Mobile Risk Assessment, showing clear steps your organization can take to mitigate business and compliance risk.

Get Started
1
Basic Information
2
Mobile Data Access
3
Mobile Device Management
4
Threat Protection
5
Vulnerability
6
Risky Behaviors & Configurations
1
2
3
4
5
6
Basic Information

Tell us a bit about your organization

2
3
4
5
6
Mobile Data Access

Do your employees have access to the following assets on mobile devices today (or in the near future):

3
4
5
6
Enterprise Mobility Management
i.e., mobile devices are required to have an EMM solution installed, such as AirWatch, MobileIron, Microsoft Intune, MaaS360, or BlackBerry UEM
4
5
6
Threat Protection
Note: Mobile Device Management solutions cannot detect mobile threats, such as threats from mobile apps, wifi networks, or advanced attacks on the device.
5
6
Vulnerability Protection
Note: Mobile vulnerabilities are software vulnerabilities in the operating system and apps that leave sensitive data exposed (not detected by Mobile Device Management).
6
Risky Behaviour and Configurations
Note: Device configurations may expose the device to data leakage, while some app behaviors can leak sensitive data and pose a compliance risk (not detected by Mobile Device Management).
* Required
Privacy Notice
If you’d like to see what we do with this information, please see our Privacy Notice
Thank you! Generating Report....
Oops! Something went wrong while submitting the form.