San Francisco, CA, USA
Jan 11, 2022   |  By Sundaram Lakshmanan
In some ways, IT teams had a great life in the early 2000s. Data was stored inside data centers and accessed through known ingress and egress points like a castle with a limited number of gates. As a result, organizations had control over exactly whom and what devices could access company data. This is no longer the case. With users accessing cloud applications with whatever networks and devices are at their disposal, those defense mechanisms have become inadequate.
Jan 10, 2022   |  By Don Tan
As a major financial hub in Asia and globally, Singapore is very aware of the challenges facing the financial industry, especially the accelerated digital transformation that stemmed from the COVID-19 pandemic. In response to the sector’s increased exposure to cloud technology, the Monetary Authority of Singapore (MAS) has released a guideline to address cybersecurity risks associated with the adoption of public clouds.
Jan 6, 2022   |  By Hank Schless
With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any device. While this newfound flexibility has changed the way we think about productivity, it has also created new cybersecurity challenges for organizations. Historically, enterprise data was stored inside data centers and guarded by perimeter-based security tools.
Dec 17, 2021   |  By Hank Schless
The pharmaceutical company Pfizer recently acknowledged that thousands of internal documents were leaked, including trade secrets related to its COVID-19 vaccine. In a California lawsuit, Pfizer stated that a former employee had exfiltrated sensitive data to their personal cloud accounts and devices while they were still working there.
Dec 16, 2021   |  By Hank Schless
In quick succession in December, The Apache Software Foundation released information on two critical vulnerabilities in its Log4j Java-based library. The first vulnerability CVE-2021-44228, also known as Log4Shell or LogJam, was reported as an unauthenticated remote code execution (RCE) vulnerability. By exploiting how the library logs error messages, it could lead to a complete system takeover.
Dec 10, 2021   |  By Mahesh Rachakonda
Here’s the reality: hybrid and remote work are here to stay. This means access to your corporate data can now come from anywhere, on any device and any network. In order to tackle this new norm, Gartner has defined a new cybersecurity framework called Secure Access Service Edge (SASE).
Dec 9, 2021   |  By Firas Azmeh
In Q1 of 2021, 4 in 10 people encountered an unsafe link while using their mobile devices – less than a year later, 5 in 10 people encountered threats in Q3 2021. This trend will only continue as text message, email and social media phishing scams surge.
Dec 7, 2021   |  By Sundaram Lakshmanan
A decade ago, many were reluctant to move to the cloud. Many felt like they would have to relinquish controls they had within their perimeters. That sentiment has since reversed, where organizations have become more comfortable with cloud technology. The newest concern is about corporate data leaving the cloud, especially as employees expect to work from anywhere. Software-as-a-service (SaaS) applications have enabled people to stay productive from anywhere, but have also amplified security gaps.
Dec 2, 2021   |  By Justin Albrecht
Here at Lookout, our Threat Intelligence Services teams work with a massive data set that enables them to proactively hunt for threats and conduct forensic investigations. While our findings are used to protect Lookout customers, we also pride ourselves in contributing to the cybersecurity community ensuring that everyone’s security and privacy are safeguarded.
Nov 23, 2021   |  By Hank Schless
More than a year of near-universal remote work has proven that many of us can reliably stay productive from anywhere — whether it be from home, co-working spaces or otherwise. Businesses have caught wind of this, and according to IDC, 60% of them will continue with remote work or implement a hybrid model even after they reopen their offices again. This calls for a paradigm shift in the way we conduct cybersecurity.
Jan 12, 2022   |  By Lookout
While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey. In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to scale back all the marketing noise surrounding the term and discuss how organizations can pragmatically get started with Zero Trust.
Jan 12, 2022   |  By Lookout
Nearly two years after we were forced to experiment with remote work, 2022 will be an inflection point for both threats and cybersecurity solutions. Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year. We'll be discussing everything from software supply chains to threat hunting and data protection.
Jan 3, 2022   |  By Lookout
All roads lead to Cloud Access Security Broker (CASB). Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey). It's no surprise, as security teams turn to CASB to solve new cloud service-related challenges that legacy security solutions cannot address.
Dec 10, 2021   |  By Lookout
Widespread remote work has called for a paradigm shift in how we conduct enterprise cybersecurity. On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology have enabled us to manage both work and personal responsibilities from anywhere and what organizations can do to securely take advantage of it.
Dec 8, 2021   |  By Lookout
Ransomware attacks aren’t going anywhere. If anything these threat actors have made their operations an enterprise, creating scalable, repeatable, and profitable campaigns. While there is no silver bullet to ransomware-proof your organization, there are a number of Zero Trust approaches that can mitigate the risk.
Dec 6, 2021   |  By Lookout
What are some of the steps you take to continuously ensure data loss isn’t an issue and what can others do to stay ahead of the problem? Hear from the team at Lookout to find out how to keep your data secure with Lookout's SASE, CASB, and ZTNA.
Dec 3, 2021   |  By Lookout
Energy is now at the epicenter as more mobile devices are used than ever before. The already strained energy industry is a prime target for bad actors — with surging mobile phishing threats and an app encounter rate that is two times higher than the average of all other industries.
Dec 1, 2021   |  By Lookout
How does Lookout define Zero Trust? The concept of Zero Trust architecture has evolved. The last two years supercharged its evolution as collaboration has forced data to go wherever it’s needed and, as a result, you’ve lost the visibility you once relied on to secure your infrastructure. Lookout Chief Marketing Officer Mike Banic speaks with Senior Manager of Security Solutions Hank Schless on how Zero Trust has evolved, the current context around it, and ways to approach the concept in a way that helps it feel more achievable.
Nov 30, 2021   |  By Lookout
What are some of the steps you take to continuously ensure data loss isn’t an issue and what can others do to stay ahead of the problem? Hear from Tom Davison, Senior Director of Security Engineering, and Nick Sears, VP Sales SASE Solutions at Lookout to find out how to keep your data secure with Lookout's SASE, CASB, and ZTNA.
Nov 29, 2021   |  By Lookout
Lookout is the only CASB in the SAP Store, and the only CASB vendor in the SAP integration partner lineup. We’ve worked closely with SAP to understand how SuccessFactors interacts with users and handles data. Recognized by Gartner as an industry-leading solution, Lookout CASB has built-in advanced data security and user and entity behavior analytics. But we wanted to ensure we can safeguard SuccessFactors and its vast functionalities, that’s why we worked hard to understand how the HCM solution interacts with users and handles data.
Nov 9, 2020   |  By Lookout
As your manufacturing organization transforms to Industry 4.0, mobile and cloud remain strategic for reinventing your operations. Not surprisingly, malicious actors have taken note of how reliant we all are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or a manufacturing operation.
Nov 9, 2020   |  By Lookout
The perimeter has disappeared. Legacy security technologies do not apply. Devices cannot be trusted. As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Read this whitepaper to.
Nov 1, 2020   |  By Lookout
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile fleet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
Nov 1, 2020   |  By Lookout
Consumer financial institutions are in the midst of a digital transformation that includes moving traditional face-to-face customer interactions to mobile devices. Forty-three percent of people who own a mobile device and have a bank account use mobile banking, according to a Federal Reserve study titled, "Consumers and Mobile Financial Services." Mobile banking creates unprecedented conveniences for customers, such as mobile check deposits, near-instant person-to-person transfers, and access to personal financial accounts in real time.

Lookout is the leader in mobile security, protecting the device at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where mobile devices are essential to all we do for work and play.

We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Our platform uses artificial intelligence to analyze data from nearly 200 million devices and over 100 million apps to protect you from the full spectrum of mobile risk. As a result, Lookout delivers modern endpoint security with the most comprehensive protection from device, network, app and phishing threats without prying into your data.

Why Lookout for iOS, Android and Chrome OS:

  • Lookout secures our digital future: We protect your smartphone, tablet and Chromebook because they are at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where these devices are essential to all we do for work and play.
  • Protect the personal and professional you: The most common start of a cyberattack is a phishing link and mobile devices have enabled new ways to send them to you. Phishing risks no longer simply hide in email, but in messaging, social media, and even dating apps. Because we use these devices for both, protecting against phishing is critical for our personal and professional lives.
  • An AI-powered security graph for mobile: We protect your data from known and unknown threats without violating your privacy and trust. In the Lookout Security Graph, we use artificial intelligence to analyze telemetry data from nearly 200 million devices and over 120 million apps. The AI of our Security Graph enables us to deliver platform modules that protect you with a lightweight app on your device.
  • A platform to protect, detect and respond: Our Security Platform is built from the ground up to secure mobile devices. We protect mobile fleets of hundreds of thousands of endpoints and stop breaches by rapidly detecting and responding to incidents. From apps with malware to ransomware and phishing scams, you are protected without lifting a finger. When a threat or an attack occurs, we provide step-by-step instructions to investigate what is happening and how to fix it.
  • A lightweight app for 360-degree security: With a lightweight app for your smartphone, tablet or Chromebook, Lookout protects you against the full spectrum of threats. The app stays connected with our platform in the cloud to deliver efficient protection on the device that cannot be subverted and optimizes for processor speed and battery life.

The world's first mobile EDR solution. Delivered on the only platform built for mobile from the ground up.