Lookout

San Francisco, CA, USA
2007
Nov 21, 2022   |  By Steve Banda
Zero trust, if implemented well, is recognized by the industry as the best way to support remote and hybrid work, especially as workers everywhere connect to SaaS applications to stay productive. But securing an entire organization goes way beyond SaaS apps. Legacy apps running on-premises or in private clouds are still critical for many organizations, especially for those who have made hefty investments in storage and network appliances to support these important applications.
Nov 18, 2022   |  By Firas Azmeh
Over 60% of the world’s population relies on technology to navigate their daily lives — that’s over 5 billion people! Unfortunately, with such a large audience online, bad actors have turned to technology to deploy scams and make a profit. Scammers use an array of channels to target people with phishing and social engineering scams that appear real, in order to trick them into handing over valuable personal information.
Nov 14, 2022   |  By Lookout
In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. While this technology offers great possibilities and convenience, it also can put your personal data at risk.
Nov 10, 2022   |  By Kristina Balaam
Researchers from Lookout Threat Lab have uncovered two new surveillance campaigns targeting Uyghurs in the People’s Republic of China and abroad. One campaign introduces a novel Android surveillance tool we named BadBazaar that shares infrastructure with other previously encountered Uyghur-targeted tooling — as outlined in a 2020 whitepaper from the Lookout Threat Intelligence team.
Nov 2, 2022   |  By Steve Banda
Telework has become a mainstay, and with it, so has employee reliance on personal mobile devices. These devices are difficult to monitor and keep up to date, presenting a unique security challenge for U.S. local, state, and federal government organizations.
Oct 31, 2022   |  By Clayton Barnard
To streamline networking management and modernize IT operations organizations are deploying software-defined wide area network (SD-WAN) systems. But as networking becomes cloud-delivered, security often lags behind. With data and applications moving to the cloud, you need an efficient way to secure the activities that are going on between branch locations and the cloud.
Oct 27, 2022   |  By Maria Teigeiro
In the early days of internet security, an access-centric security model made sense. Access lists on routers were complemented by firewalls and, later, intrusion detection systems. Given the processing capacity available at the time, this was absolutely adequate and appropriate for protecting a website, even with e-commerce. But that was the 1990s, and the internet has become so much more than websites with some shopping capabilities. Now, it’s the backbone of our society.
Oct 24, 2022   |  By Steve Banda
The internet is now your default corporate network. This has some major perks — it means that your employees can access whatever they need from wherever they need it. But using the internet like this has also made your organization's security posture more complex. People are using networks and devices your IT doesn't manage, and they are accessing data that is scattered across countless apps.
Oct 20, 2022   |  By Hank Schless
Business email compromise (BEC) is big business for malicious actors. According to the 2021 FBI Internet Crime Report, BEC was responsible for nearly $2.4 billion in cyber crime losses in 2021. At its root, it’s a type of phishing attack. And with the rise of smartphones and tablets, attackers are expanding well beyond email. They now leverage other platforms such as SMS messages, messaging apps like Signal and WhatsApp, and social media apps to target and compromise their targets.
Oct 18, 2022   |  By Sundaram Lakshmanan
In the past when organizations had a new security need, they would meet that need by purchasing a new security product. But that approach is how we ended up with an average of 76 security tools per enterprise, according to a 2021 survey from Panaseer. You may have a lot of tools, but that doesn’t mean your information is protected.
Sep 20, 2022   |  By Lookout
The Lookout security platform allows users to successfully collaborate with partners and vendors while keeping confidential information secure. With data loss prevention and dynamic digital rights management, users can securely collaborate with tools like Microsoft Teams, Slack, and email.
Sep 20, 2022   |  By Lookout
Jim Dolce recorded a video interview with the Fedscoop editorial team at the Zero Trust Summit in Washington, D.C., an event that gathered top government IT decision makers and influencers in-person and virtual via livestream for a day of engaging conversations on the adoption of Zero Trust
Sep 20, 2022   |  By Lookout
Jim Dolce was featured on a moderated main stage discussion, alongside Francis Rose, at the Zero Trust Summit in Washington, D.C. This engaging conversation examined how to secure the edge to meet OMB Zero Trust requirements. The event gathered top government IT decision makers and influencers in-person and virtual via livestream for a day of engaging conversations on the adoption of Zero Trust.
Sep 8, 2022   |  By Lookout
You've migrated to the cloud, which has made you more efficient and agile. But this comes with new security challenges. Your data is outside your corporate network: In public clouds, on personal devices, on unsanctioned apps, and handled by networks you don't own. The more spread out your data is, the less visibility and control you have.
Aug 25, 2022   |  By Lookout
Collaboration helps improve innovation and speed of delivery. Based on SSE, Lookout security platform allows organizations to securely enable user collaboration without putting sensitive data at risk.
Aug 17, 2022   |  By Lookout
VP of product, David Richardson, joins ABC7 to discuss device and online protection best practices for both parents with kids going back to school.
Aug 4, 2022   |  By Lookout
VP of product, David Richardson, joins KTVU to discuss device and online protection best practices for both parents with kids going back to school and students heading off to college.
Jun 30, 2022   |  By Lookout
Greater care should be taken when transferring corporate data onto a remote user's managed endpoint. Certain types of data often require greater levels of authorization to leave the confines of the organization and managed app. When trying to download confidential information, we want to reverify the user's identity with step-up authentication. When the file is downloaded, in addition to file encryption, we also want to add a watermark and redact the confidential information.
Jun 30, 2022   |  By Lookout
When working remotely, users are susceptible to Internet-based threats like phishing and malware. With the Lookout Security Service Edge (SSE) platform, organizations can prevent the loss of personal information and the installation of malware by assessing each link a user tries to access, regardless of what doc or app contains the link.
Jun 30, 2022   |  By Lookout
Organizations need to maintain security controls on corporate data regardless of where the users work location. When uploading content to a cloud storage provider, the Lookout SSE platform can help direct users to use corporate providers instead of personal. And when data is downloaded locally, the Lookout platform can protect the data outside of the managed app through encryption.
Nov 9, 2020   |  By Lookout
As your manufacturing organization transforms to Industry 4.0, mobile and cloud remain strategic for reinventing your operations. Not surprisingly, malicious actors have taken note of how reliant we all are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or a manufacturing operation.
Nov 9, 2020   |  By Lookout
The perimeter has disappeared. Legacy security technologies do not apply. Devices cannot be trusted. As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Read this whitepaper to.
Nov 1, 2020   |  By Lookout
Consumer financial institutions are in the midst of a digital transformation that includes moving traditional face-to-face customer interactions to mobile devices. Forty-three percent of people who own a mobile device and have a bank account use mobile banking, according to a Federal Reserve study titled, "Consumers and Mobile Financial Services." Mobile banking creates unprecedented conveniences for customers, such as mobile check deposits, near-instant person-to-person transfers, and access to personal financial accounts in real time.
Nov 1, 2020   |  By Lookout
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile fleet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.

Lookout is the leader in mobile security, protecting the device at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where mobile devices are essential to all we do for work and play.

We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Our platform uses artificial intelligence to analyze data from nearly 200 million devices and over 100 million apps to protect you from the full spectrum of mobile risk. As a result, Lookout delivers modern endpoint security with the most comprehensive protection from device, network, app and phishing threats without prying into your data.

Why Lookout for iOS, Android and Chrome OS:

  • Lookout secures our digital future: We protect your smartphone, tablet and Chromebook because they are at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where these devices are essential to all we do for work and play.
  • Protect the personal and professional you: The most common start of a cyberattack is a phishing link and mobile devices have enabled new ways to send them to you. Phishing risks no longer simply hide in email, but in messaging, social media, and even dating apps. Because we use these devices for both, protecting against phishing is critical for our personal and professional lives.
  • An AI-powered security graph for mobile: We protect your data from known and unknown threats without violating your privacy and trust. In the Lookout Security Graph, we use artificial intelligence to analyze telemetry data from nearly 200 million devices and over 120 million apps. The AI of our Security Graph enables us to deliver platform modules that protect you with a lightweight app on your device.
  • A platform to protect, detect and respond: Our Security Platform is built from the ground up to secure mobile devices. We protect mobile fleets of hundreds of thousands of endpoints and stop breaches by rapidly detecting and responding to incidents. From apps with malware to ransomware and phishing scams, you are protected without lifting a finger. When a threat or an attack occurs, we provide step-by-step instructions to investigate what is happening and how to fix it.
  • A lightweight app for 360-degree security: With a lightweight app for your smartphone, tablet or Chromebook, Lookout protects you against the full spectrum of threats. The app stays connected with our platform in the cloud to deliver efficient protection on the device that cannot be subverted and optimizes for processor speed and battery life.

The world's first mobile EDR solution. Delivered on the only platform built for mobile from the ground up.