Know your risk

Know Your Data Risk Score for Your Enterprise Business

Are you ready to learn more?
Question 1 / 15
Do you need to comply with regulations and ensure specific data is protected?
No
Unsure
Yes
Question 2 / 15
Are you able to automatically detect and remove an unauthorized email recipient from an outgoing email?
No
Unsure
Yes
Back
Question 3 / 15
Are your partners and contractors able to access and share your sensitive data?
No
Unsure
Yes
Back
Question 4 / 15
Are you alerted to anomalous user behavior, such as simultaneous logins to an application, excessive outgoing emails or downloads of sensitive data?
No
Unsure
Yes
Back
Question 5 / 15
Are you able to automatically detect and encrypt any file containing sensitive data that is downloaded to personal devices and control who can decrypt that data and for how long it can be accessed?
No
Unsure
Yes
Back
Question 6 / 15
Are your IT admins automatically alerted if public links to sensitive data are inadvertently shared by employees?
No
Unsure
Yes
Back
Question 7 / 15
Are you able to automatically require users to provide additional authentication upon attempting to access highly sensitive data?
No
Unsure
Yes
Back
Question 8 / 15
Do you integrate with industry classifications so that you can detect and protect sensitive information that is specific to your industry?
No
Unsure
Yes
Back
Question 9 / 15
Can you differentiate in real-time between corporate and personal instances of applications, such as Google Workspace and Office 365, so that you can respect user privacy while also protecting sensitive corporate data?
No
Unsure
Yes
Back
Question 10 / 15
Are you concerned about using VPN to access any of your enterprise applications?
No
Unsure
Yes
Back
Question 11 / 15
Can you prevent users from uploading sensitive data to their own personal unsanctioned web apps and websites?
No
Unsure
Yes
Back
Question 12 / 15
Are you able to create a single data protection policy using one admin console and apply that policy across all cloud services (e.g., SaaS apps, internet, email, and private apps)?
No
Unsure
Yes
Back
Question 13 / 15
Are you able to detect sensitive data such as social security numbers or credit card information in Slack and Teams messages, and mask or redact that data in real-time within the message?
No
Unsure
Yes
Back
Question 14 / 15
Are you currently alerted to user activities that indicate an insider threat within your organization?
No
Unsure
Yes
Back
Question 15 / 15
Can you extend secure zero trust access to remote employees and third-parties to your private applications without using a VPN?
No
Unsure
Yes
Back

Please fill out the form below to view your security assessment results.

Previous
Next step

Knowing your risk is the first step to ensuring the protection of your data and your enterprise organization.

In just a few minutes of your time and with 15 questions we will give you a high, medium or low risk rating that will enable you to have more informed conversations regarding your enterprise security posture.

Your Lookout Risk Assessment Results

High

Based on your responses, your risk score is high, which means your organization is 3X more likely to experience a data breach than those with a low risk score.

Results Summary

Below is a summary of potential security gaps and recommendations for improving your security posture.

Security Gaps

  • You likely lack the visibility and control of your sensitive data that is required for compliance with data privacy regulations.
  • You might not be able to prevent sensitive data from leaking to unauthorized recipients via email or other collaboration tools like Slack or Microsoft Teams.
  • You are not able to detect anomalous user activity that is needed to prevent insider threats.
  • You lack visibility into personal apps and are unable to prevent sensitive data leakage to these apps.
  • You likely use VPN as your primary remote access solution, which provides excessive access to your entire network, which can be exploited by an attacker.

Recommendations

If you have not yet done so, you should take steps to move your security stack to the cloud. It is only with cloud-native security that you can properly secure your hybrid workforce and sensitive data in cloud apps.

Adoption of a data-centric cloud security solution will enable you to provide secure seamless access to the internet, SaaS apps, and private enterprise apps. It also provides the necessary foundation for comprehensive data protection.

The right solution will have natively-integrated data loss prevention, digital rights management, and user entity behavior analytics. These protections work together to ensure you can securely share data with internal and external parties, detect anomalous user behavior to prevent insider threats, and encrypt data that is downloaded to unmanaged devices.

A data-centric cloud security solution will also enable you to phase out your VPN deployment in favor of remote access to private apps that is seamless and secure. Since access is only provided to the specific app rather than the entire network, an attacker cannot move laterally throughout the network in the event of a breach.

Finally, select a solution that offers a unified platform with natively integrated components so that security policies can be applied across all cloud services. This will enable you to consolidate IT administration, reduce costs, and improve your overall security posture.

Next Steps

We encourage you to further explore your security gaps by taking advantage of our free SaaS Risk Evaluation. We monitor the SaaS apps of your choice for two-weeks and provide you with actionable insights and recommendations. At the end of the evaluation, you will receive a report that details security risks to help you make informed decisions about data security.

Medium

Based on your responses, your risk score is medium, which means your organization is 2X as likely to experience a data breach than those with a low risk score.

Results Summary

Below is a summary of potential security gaps and recommendations for improving your security posture.

Security Gaps
  • You may not have moved your security stack to the cloud and lack visibility into your apps and data.
  • You might have an on-premise data loss prevention (DLP) solution that cannot prevent sensitive data loss via email or other SaaS apps.
  • You likely do not have the ability to detect anomalous user activity to prevent insider threats.
  • You probably lack adequate protection against internet-based threats and data leakage.
  • You likely use VPN as your primary remote access solution, which provides excessive access to your entire network, which can be exploited by an attacker.
Recommendations

If you have not yet done so, you should take steps to move your security stack to the cloud. It is only with cloud-native security that you can properly secure your hybrid workforce and sensitive data in cloud apps.

Adoption of a data-centric cloud security solution will enable you to provide secure seamless access to the internet, SaaS apps, and private enterprise apps. It also provides the necessary foundation for comprehensive data protection.

The right solution will have natively-integrated data loss prevention, digital rights management, and user entity behavior analytics. These protections work together to ensure you can securely share data with internal and external parties, detect anomalous user behavior to prevent insider threats, and encrypt data that is downloaded to unmanaged devices.

A data-centric cloud security solution will also enable you to phase out your VPN deployment in favor of remote access to private apps that is seamless and secure. Since access is only provided to the specific app rather than the entire network, an attacker cannot move laterally throughout the network in the event of a breach.

Finally, select a solution that offers a unified platform with natively integrated components so that security policies can be applied across all cloud services. This will enable you to consolidate IT administration, reduce costs, and improve your overall security posture.

Next Steps

We encourage you to further explore your security gaps by taking advantage of our free SaaS Risk Evaluation. We monitor the SaaS apps of your choice for two-weeks and provide you with actionable insights and recommendations. At the end of the evaluation, you will receive a report that details security risks to help you make informed decisions about data security.

Low

Based on your responses, your risk score is low, which means your organization is 3X less likely to experience a data breach than those with a high risk score.

Results Summary

Below is a summary of potential security gaps and recommendations for improving your security posture.

Security Gaps
  • You have likely moved most of your security stack to the cloud but still have some on-premises solutions that need to be moved.
  • You can prevent sensitive data from being shared across most of your cloud services but some gaps still exist among on-premises solutions that are not covered by policies.
  • You have a process in place to detect anomalous user activity across your environment but full visibility across all your cloud services is not available yet. This means you can prevent an insider threat in many scenarios but blind spots still exist.
  • You have replaced VPN with zero trust network access for several of your private enterprise applications. However, these protection policies are likely administered separately from those applied to your other cloud services, creating potential for inconsistent policy application.
Recommendations

Continue to move your full security stack to the cloud so that you have complete visibility and control over your data and cloud services. It is only with fully integrated cloud security that you can properly secure your hybrid workforce and sensitive data in cloud apps.

Adoption of a data-centric cloud security solution will enable you to provide secure seamless access to the internet, SaaS apps, and private enterprise apps. It also provides the necessary foundation for comprehensive data protection.

The right solution will have natively-integrated data loss prevention, digital rights management, and user entity behavior analytics. These protections work together to ensure you can securely share data with internal and external parties, detect anomalous user behavior to prevent insider threats, and encrypt data that is downloaded to unmanaged devices.

A data-centric cloud security solution will also enable you to phase out your VPN deployment in favor of remote access to private apps that is seamless and secure. Since access is only provided to the specific app rather than the entire network, an attacker cannot move laterally throughout the network in the event of a breach.

Finally, select a solution that offers a unified platform with natively integrated components so that security policies can be applied across all cloud services. This will enable you to consolidate IT administration, reduce costs, and improve your overall security posture.

Next Steps

We encourage you to further explore your security gaps by taking advantage of our free SaaS Risk Evaluation. We monitor the SaaS apps of your choice for two-weeks and provide you with actionable insights and recommendations. At the end of the evaluation, you will receive a report that details security risks to help you make informed decisions about data security.