The Mobile Maturity Assessment
* Required
Email address
*
Your email
What industry is your business a part of?
*
Industrial services (Construction, Engineering, Manufacturing)
Software & Technology
Education
Financial Services
Government
Healthcare
Energy & Utilities
Professional Services
Retail
Telecommunications
How many of the mobile devices used by your organization’s employees are owned and deployed by the IT department vs. sourced via bring your own device?
*
All BYOD
Majority BYOD
Majority corporately owned
All corporately owned
Which of the following operating systems is most prominent among your organization’s fleet of mobile devices?
*
Apple iOS
Samsung Android
Other Android
Windows Phone
Blackberry OS
Other
How does your organization currently protect against mobile threats like phishing and malware?
*
Has not implemented specific measures to protect against mobile threats.
Detects threats once they reach the device only.
Detects threats at the device, application and network levels.
Actively intercepts and contains attacks before they reach the device.
How does your organization currently manage mobile security risks?
*
Does not actively monitor security risks on mobile devices or apps.
Monitors and resolves device based issues (eg. OS and rogue configurations only)
Monitors and resolves device-based issues and mitigates Shadow IT risks.
Monitors and resolves device-based issues, mitigates Shadow IT risks and prevents data leaks.
Are you confident your organization has adequate security measures in place to protect against mobile data breaches?
*
Not confident
Somewhat confident
Confident
Confident
What is your organization’s approach to filtering content on enterprise mobile devices?
*
Only filters content on corporate- owned networks
Blacklists certain applications from being used on mobile devices.
Implements filters across app and in-browser usage.
Implements context sensitive policies based on privileges, network connection, geography etc.
Which of the following best describes your organization’s ability to monitor mobile data usage?
*
Implements context sensitive policies based on privileges, network connection, geography etc.
Receives monthly updates from carriers on total data usage and takes action in response.
Blocks data hungry services and/or personal apps (e.g. Facebook, Youtube).
Implements granular data policies based on connection, geography, job title etc. in browser and apps.
Which of the following best describes your organization’s current approach to mobile device management?
*
Not currently using an MDM or managing mobile devices only at the app level (Mobile Application Management)
Managing mobile devices using a MDM (Mobile Device Management) solution.
Managing mobile devices using a mix of MDM and MAM (Enterprise Mobility Management)
Using one unifying solution to manage all of my endpoints (including laptops, mobile devices etc.) (Unified Endpoint Management)
Which of the following best describes your organization’s current approach to mobility and security integration?
*
Mobility and security solutions operate independently of one another with no integration
Actively using at least one mobile and/or security integration
Actively using at least three mobile and/or security integrations
All mobility and security solutions are integrated
How many staff within your organization are dedicated to implementing, managing and maintaining mobile security?
*
None
At least one
Between 2 and 5
Over 5
Submit
This form was created inside of Wandera.
Report Abuse
Forms