Organization and Behavior
Which of the following security leadership roles does your organization have?
Check all that apply
Which best describes your organization's strategy for dealing with user-led (i.e., shadow) SaaS applications?
Which of the following measures has your organization taken to secure user-led (i.e., shadow) services?
Check all that apply
Has a user-led (i.e., shadow) SaaS application ever become a fully-IT-sanctioned cloud application after discovery and evaluation?
Does your organization currently use a CASB to control and secure the use of cloud applications and services?
Please categorize (to the best of your ability) each of the following uses for your CASB?
Risk management
Data discovery and classification
Access control
Authorization management
Data encryption
Data Loss Prevention (DLP)
Threat detection and prevention
Insider Threat Detection
License Management