Mobile Risk Assessment

In this 2 minute survey, we’ll learn about your mobility situation by asking questions about data access on smartphones and tablets, as well as any existing controls you’ve already put in place. We’ll then generate your customised Mobile Risk Assessment for you to review.

Get Startedarrow_forward


Basic Information


Mobile Data Access


Mobile Device


Threat Protection


Vulnerability Protection


Risky Behaviours &

  • 1check Basic Information

  • 2check Mobile Data Access

  • 3check Enterprise Mobility Management

  • 4check Threat Protection

  • 5check Vulnerability Protection

  • 6check Risky Behaviours & Configurations

Basic Information

Tell us a bit about your organisation

What is the distribution of mobile device platforms at your organisation?

Do employees travel to foreign countries that would concern you from a security standpoint?

Mobile Data Access

Do your employees have access to the following assets on mobile devices today (or in the near future):

Email, corporate messaging, contacts or calendar?info_outline

Enterprise apps?info_outline

Corporate networks?info_outline

Multi-factor authentication or stored credentials?info_outline

Administrative tools?info_outline

Enterprise Mobility Management

Does your organisation manage mobile devices?

Are mobile devices required to have an "enterprise mobility management" solution installed, such as AirWatch, MobileIron, Microsoft Intune, MaaS360 or Blackberry UEM?

Have you implemented the below capabilities on mobile devices:

Jailbreak and root detection?info_outline

Remote device wipe and lock?info_outline

Lock screen requirements?info_outline

Mobile containers?info_outline

Rights management solutions?info_outline

Threat Protection

Are you able to detect mobile threats?

Mobile Device Management solutions cannot detect mobile threats, such as threats from mobile apps, wifi networks or advanced attacks on the device

Are you able to detect the following threats on mobile devices:

Malicious apps?info_outline

Apps downloaded from 3rd party app stores?info_outline

Man-in-the-middle attacks over wifi or cellular connections?info_outline

Targeted attacks on the mobile operating system?info_outline

Mobile phishing attacks?info_outline

Risky websites?info_outline

Vulnerability Protection

Are you able to detect mobile vulnerabilities?

Software vulnerabilities in the operating system and apps that leave sensitive data exposed (not detected by Mobile Device Management)

Are you able to detect the following vulnerabilities on mobile devices:

App-based vulnerabilities?info_outline

Operating system vulnerabilitiesinfo_outline

Risky Behaviours & Configurations

Are you able to detect risky mobile configurations and app behaviours?

Device configurations may expose the device to data leakage, while some app behaviours can leak sensitive data and pose a compliance risk (not detected by Mobile Device Management)

Are you able to detect the following risky behaviours & configurations on mobile devices:

Vulnerable device configurations?info_outline

App data leakage?info_outline

Rogue wifi hotspots?info_outline

Thank you for completing the survey. We've calculated your results based on your responses, please enter your details below to receive a copy of your custom report.

arrow_backBack Nextarrow_forward Please answer all questions


    To provide you with the best experience, this site uses cookies. By using our site, you consent to our cookies. Learn More