• 1
  • 2
  • 3

Organization and Behavior

Which of the following security leadership roles does your organization have?
Check all that apply

Which best describes your organization's strategy for dealing with user-led (i.e., shadow) SaaS applications?

Which of the following measures has your organization taken to secure user-led (i.e., shadow) services?
Check all that apply

Has a user-led (i.e., shadow) SaaS application ever become a fully-IT-sanctioned cloud application after discovery and evaluation?

Does your organization currently use a CASB to control and secure the use of cloud applications and services?

Please categorize (to the best of your ability) each of the following uses for your CASB?

Risk management

Data discovery and classification

Access control

Authorization management

Data encryption

Data Loss Prevention (DLP)

Threat detection and prevention

Insider Threat Detection

License Management