Lookout

San Francisco, CA, USA
2007
Nov 17, 2020   |  By Hank Schless
It goes without saying that mobility has become the key to productivity for any modern business. This is especially true for the highly competitive pharmaceutical industry. To be the first to bring a ground-breaking treatment or vaccine to market, pharmaceutical organizations need their employees to stay productive whether they’re working on your organization’s premises or not.
Nov 10, 2020   |  By Bob Stevens
A Government Business Council report from September of this year found 63% of federal employees are fully remote, with many expecting to remain that way for at least the next six months. In this new reality, mobile devices have become a critical lifeline. But the mobile phones and tablets that keep us efficient and effective also open our organizations up to new risks against which existing security does not defend.
Oct 28, 2020   |  By Firas Azmeh
Our mission has always been to secure the mobile experience and for many in our current climate, that means protecting employees as they work from home. Verizon recently announced the launch of Business Mobile Secure, a full security solution designed specifically for small and medium business customers with Lookout mobile security at the helm of the bundle’s modern endpoint protection offerings.
Oct 27, 2020   |  By Alex Gladd
We just recently unveiled the industry’s first mobile endpoint detection and response (EDR) solution. This is an industry game changer as we are providing the same tools the Lookout security researchers use to hunt for novel threats to our customers to investigate cyberattacks. If you want to learn more about how we did it, I strongly encourage you to read our Chief Strategy Officer Aaron Cockerill’s blog on the announcement.
Oct 21, 2020   |  By Aaron Cockerill
In case you missed it, Lookout just announced something that I’m super excited about – the introduction of threat hunting and research into the Lookout Security Platform. The reason this is so satisfying is because we are enabling organizations to use the same tools our security analysts have been using for years.
Oct 13, 2020   |  By Nancy Lam
Productivity suites have changed the way we work With the advent of cloud productivity platforms, tablets and smartphones have become an integral part of our work and personal lives. At any time, we are one tap away from accessing the same content as our desktop computers. In some ways, mobile devices have replaced those traditional devices as our main productivity tool. To borrow a line from a current ad campaign for tablets – “your next computer is not a computer.”
Sep 29, 2020   |  By Gert-Jan Schenk
If you bring up the topic of “shadow IT” to your head of IT, you will likely get a lecture about how employees need to follow protocol when using cloud cloud services so they don’t put the organization at risk. They’re not wrong. Without proper protection, unsanctioned tools can have significant consequences and unintentionally introduce security gaps.
Sep 15, 2020   |  By David Richardson
Here at Lookout, we spend a lot of time talking about how best to secure tablets and smartphones. That’s because they dominate our lives. But as some of our daily routines continue to stay virtual and our kids return to school, the importance of securing Chromebooks has become top of mind. Chromebooks have become an essential tool for schools that transitioned to distance learning in the spring.
Sep 3, 2020   |  By David Richardson
The IDC MarketScape for Mobile Threat Management Software just named Lookout a leader for the third consecutive year. Everyone at Lookout works hard to make sure we provide the best mobile security for our customers, so it’s incredibly satisfying to have the MarketScape recognize our capabilities and strategies. We’re honored for the recognition of our capabilities for the third consecutive year.
Sep 1, 2020   |  By Hank Schless
The coronavirus pandemic forced the world’s workforce to retreat from their offices in a hurry. In that process, it proved something many of us already knew: employees can work productively without needing to be physically present or connected to the corporate network. Assisted by cloud-based productivity apps, tablets and smartphones have untethered us from the office space. At any time, I can pull out my phone and resume working via the cloud.
Nov 16, 2020   |  By Lookout
Our mission is to protect your data in today's post-perimeter, privacy-focused world. With your applications and data migrating to the cloud, and 5G wireless networks right around the corner, securing your mobile endpoints is no longer an option—it’s an imperative.
Nov 16, 2020   |  By Lookout
We don’t need to be in the office to stay productive anymore. Cloud apps and personal devices have enabled us to connect to work from anywhere. To fully protect your organization in this climate, you have to assume that no device is trustworthy until its risk level is verified.
Nov 16, 2020   |  By Lookout
Regardless of how many employees you have, your growing business faces the same threats as larger organizations. And you depend on engaging your customers on a personal level to stand out in the crowd. So to preserve that relationship, you need a mobile security solution that protects your data and their privacy.
Mar 4, 2019   |  By Lookout
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.
Nov 8, 2018   |  By Lookout
As part of Cybersecurity Awareness Month, Lookout held a special briefing sponsored by Rep. Ted Lieu and Rep. Jim Longevin, that focused on how cybersecurity attacks can impact the entire democratic process -- from political campaigns and elections to journalists, lobbyists and activists that participate in the process. The session included a live demo of how a cyberattack could happen on a mobile device.
Nov 1, 2018   |  By Lookout
Learn more about post-perimeter security: today's architecture for a new age of work
Nov 1, 2018   |  By Lookout
Learn more about post-perimeter security: today's architecture for a new age of work
May 30, 2017   |  By Lookout
Your data is now mobile and out of your control. New research is changing the way CISOs perceive the risks to critical data from the mobile ecosystem — and how they should secure it. Get visibility into the full spectrum of mobile risk to protect intellectual property and increase productivity.
Nov 15, 2016   |  By Lookout
Lookout Identity Protection and Breach Report Secure your mobile device & identity with one app. Announcing new Identity Theft Protection for Lookout Personal.
Apr 8, 2016   |  By Lookout
With adoption of Windows 10 in the enterprise, PC security architectures look like mobile security architectures.
Nov 9, 2020   |  By Lookout
As your manufacturing organization transforms to Industry 4.0, mobile and cloud remain strategic for reinventing your operations. Not surprisingly, malicious actors have taken note of how reliant we all are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or a manufacturing operation.
Nov 9, 2020   |  By Lookout
The perimeter has disappeared. Legacy security technologies do not apply. Devices cannot be trusted. As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Read this whitepaper to.
Nov 1, 2020   |  By Lookout
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile fleet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
Nov 1, 2020   |  By Lookout
Consumer financial institutions are in the midst of a digital transformation that includes moving traditional face-to-face customer interactions to mobile devices. Forty-three percent of people who own a mobile device and have a bank account use mobile banking, according to a Federal Reserve study titled, "Consumers and Mobile Financial Services." Mobile banking creates unprecedented conveniences for customers, such as mobile check deposits, near-instant person-to-person transfers, and access to personal financial accounts in real time.

Lookout is the leader in mobile security, protecting the device at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where mobile devices are essential to all we do for work and play.

We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Our platform uses artificial intelligence to analyze data from nearly 200 million devices and over 100 million apps to protect you from the full spectrum of mobile risk. As a result, Lookout delivers modern endpoint security with the most comprehensive protection from device, network, app and phishing threats without prying into your data.

Why Lookout for iOS, Android and Chrome OS:

  • Lookout secures our digital future: We protect your smartphone, tablet and Chromebook because they are at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where these devices are essential to all we do for work and play.
  • Protect the personal and professional you: The most common start of a cyberattack is a phishing link and mobile devices have enabled new ways to send them to you. Phishing risks no longer simply hide in email, but in messaging, social media, and even dating apps. Because we use these devices for both, protecting against phishing is critical for our personal and professional lives.
  • An AI-powered security graph for mobile: We protect your data from known and unknown threats without violating your privacy and trust. In the Lookout Security Graph, we use artificial intelligence to analyze telemetry data from nearly 200 million devices and over 120 million apps. The AI of our Security Graph enables us to deliver platform modules that protect you with a lightweight app on your device.
  • A platform to protect, detect and respond: Our Security Platform is built from the ground up to secure mobile devices. We protect mobile fleets of hundreds of thousands of endpoints and stop breaches by rapidly detecting and responding to incidents. From apps with malware to ransomware and phishing scams, you are protected without lifting a finger. When a threat or an attack occurs, we provide step-by-step instructions to investigate what is happening and how to fix it.
  • A lightweight app for 360-degree security: With a lightweight app for your smartphone, tablet or Chromebook, Lookout protects you against the full spectrum of threats. The app stays connected with our platform in the cloud to deliver efficient protection on the device that cannot be subverted and optimizes for processor speed and battery life.

The world's first mobile EDR solution. Delivered on the only platform built for mobile from the ground up.