San Francisco, CA, USA
Sep 20, 2023   |  By Lookout
SaaS applications like Microsoft 365, Google Workspace, and Salesforce are now a ubiquitous part of business. With so much corporate data now residing in the cloud, a perimeter-based approach to security doesn’t cut it. To enforce cloud data protection policies across SaaS apps, a cloud access security broker (CASB) has become a necessity.
Sep 5, 2023   |  By Lookout
In today's rapidly evolving technological landscape, SaaS applications have been essential in driving efficiency and promoting collaboration. But the benefits of the cloud also bring new risks, and securing your organization against a vast array of cloud security threats can be a unique challenge.
Aug 15, 2023   |  By Lookout
The rise of hybrid work has accelerated digital transformation for organizations of all sizes. As a result, more and more applications and data are moving to the cloud. While this has created a number of benefits — including cost savings, ease of access, and increased operational efficiencies — the cloud has also made it more challenging to protect sensitive data.
Aug 10, 2023   |  By Brian Buck
Today, cybersecurity companies are in a never-ending race against cyber criminals, each seeking innovative new tactics to outpace the other. The newfound accessibility of generative artificial intelligence (gen AI) has revolutionized how people work, but it's also made threat actors more efficient. Attackers can now quickly create phishing messages or automate vulnerability discoveries.
Jul 27, 2023   |  By Varaprasad Goud Muthyam
With the rise of hybrid work, data leakage has become a significant issue. Employees are now working from a variety of locations, including their homes, coffee shops, and even public libraries. This makes it more difficult to keep track of data moving between managed endpoints and your organization's SaaS applications or private apps. Shadow IT, the use of unauthorized or unapproved software and services by employees has always been a challenge for IT departments.
Jul 25, 2023   |  By Sundaram Lakshmanan
For more than two decades, virtual private networks (VPNs) have been the go-to technology for enterprise remote access — and by extension, for enforcing remote access security. Even ubiquitous internet connections are often redirected via VPN to a central data center, where security enforcement occurs through various hardware appliances. From there, the traffic is forwarded onward to the internet. Of course, it must follow the same indirect path back on the response side.
Jul 24, 2023   |  By Sundaram Lakshmanan, CTO
Over the past decade, the working world has undergone a dramatic transformation. Spending each day of the week in an office is no more for most, while many have the flexibility to work from any location using a device and network that the organisation often has no control over. Productivity levels have certainly increased because of the flexible working environment, but it has opened the door to new challenges, mainly protecting the organisation's critical assets.
Jul 19, 2023   |  By Justin Albrecht
We often think of advanced persistent threats or APTs as threats primarily targeting governments for cyber espionage, but they could have just as much impact on the private sector. Oftentimes, both the techniques and the tooling used overlap between APTs and financially-motivated cybercriminals, and some APT groups themselves have taken to moonlighting as cybercriminals for profit.
Jun 21, 2023   |  By Hank Schless
In quick succession at the end of May into mid-June, software developer Progress released three advisories that any customers using its popular managed file transfer (MFT) solution MOVEit should immediately update to the latest release. In this time, they were made aware of three critical vulnerabilities, CVE-2023-34362 on May 31, CVE-2023-35036 on June 9, and CVE-2023-35708 on June 15.
Jun 16, 2023   |  By Tim LeMaster
In today's increasingly mobile-driven world, securing our digital assets and protecting sensitive information is of paramount importance. To address this need, the National Institute of Standards and Technology (NIST) recently released the latest version of their publication, NIST 800-124 Rev. 2: Guidelines for Managing the Security of Mobile Devices in the Enterprise.
Sep 19, 2023   |  By Lookout
With Lookout, users are protected from accessing phishing links that attempt to steal sensitive information. Additionally, web content is filtered in real-time to block access to malicious websites and malicious content.
Sep 19, 2023   |  By Lookout
Hybrid work requires a new approach to internet security. By utilizing a cloud delivered platform, you can provide the appropriate security protections for your data and your users.
Sep 13, 2023   |  By Lookout
A way to protect your hybrid workforce *and* your corporate data on any app, device, or endpoints? With the Lookout Cloud Security Platform, you can offer your employees the freedom to collaborate, at any place, any time, from any device with total peace of mind. And that’s because the Lookout Cloud Security Platform allows you to detect, mitigate, and respond to real-time threats without locking down apps and devices.
Sep 1, 2023   |  By Lookout
Lookout Secure Cloud Access is a data-centric cloud access security broker (CASB) that provides full visibility and control over your cloud data, no matter who is accessing it, or what device and app is being used. Watch this video to learn why you need a CASB, how Lookout Secure Cloud Access works, and how it can protect your cloud data no matter where it goes.
Aug 31, 2023   |  By Lookout
On this episode of Talk Data To Me, CTO Sundaram Lakshmanan and host Stephen Banda deep dive into CASB and cloud security best practices.
Aug 16, 2023   |  By Lookout
On this episode of Talk Data To Me, Senior Threat Researcher Kristina Balaam and host Hank Schless delve into the ever-growing impact of APT activities and learn how to mitigate the risks they bring to your organization.
Aug 10, 2023   |  By Lookout
In this episode of “Talk Data To Me,” Hank Schless and Aaron Cockerill explain how attacks on mobile devices can lead to a breach of data in the cloud. For a business to succeed, data should be protected regardless of where it moves or who has access to it.
Nov 9, 2020   |  By Lookout
As your manufacturing organization transforms to Industry 4.0, mobile and cloud remain strategic for reinventing your operations. Not surprisingly, malicious actors have taken note of how reliant we all are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or a manufacturing operation.
Nov 9, 2020   |  By Lookout
The perimeter has disappeared. Legacy security technologies do not apply. Devices cannot be trusted. As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Read this whitepaper to.
Nov 1, 2020   |  By Lookout
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile fleet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
Nov 1, 2020   |  By Lookout
Consumer financial institutions are in the midst of a digital transformation that includes moving traditional face-to-face customer interactions to mobile devices. Forty-three percent of people who own a mobile device and have a bank account use mobile banking, according to a Federal Reserve study titled, "Consumers and Mobile Financial Services." Mobile banking creates unprecedented conveniences for customers, such as mobile check deposits, near-instant person-to-person transfers, and access to personal financial accounts in real time.

Lookout is the leader in mobile security, protecting the device at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where mobile devices are essential to all we do for work and play.

We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Our platform uses artificial intelligence to analyze data from nearly 200 million devices and over 100 million apps to protect you from the full spectrum of mobile risk. As a result, Lookout delivers modern endpoint security with the most comprehensive protection from device, network, app and phishing threats without prying into your data.

Why Lookout for iOS, Android and Chrome OS:

  • Lookout secures our digital future: We protect your smartphone, tablet and Chromebook because they are at the intersection of the personal you and the professional you. Our mission is to secure and empower our digital future in a privacy-focused world where these devices are essential to all we do for work and play.
  • Protect the personal and professional you: The most common start of a cyberattack is a phishing link and mobile devices have enabled new ways to send them to you. Phishing risks no longer simply hide in email, but in messaging, social media, and even dating apps. Because we use these devices for both, protecting against phishing is critical for our personal and professional lives.
  • An AI-powered security graph for mobile: We protect your data from known and unknown threats without violating your privacy and trust. In the Lookout Security Graph, we use artificial intelligence to analyze telemetry data from nearly 200 million devices and over 120 million apps. The AI of our Security Graph enables us to deliver platform modules that protect you with a lightweight app on your device.
  • A platform to protect, detect and respond: Our Security Platform is built from the ground up to secure mobile devices. We protect mobile fleets of hundreds of thousands of endpoints and stop breaches by rapidly detecting and responding to incidents. From apps with malware to ransomware and phishing scams, you are protected without lifting a finger. When a threat or an attack occurs, we provide step-by-step instructions to investigate what is happening and how to fix it.
  • A lightweight app for 360-degree security: With a lightweight app for your smartphone, tablet or Chromebook, Lookout protects you against the full spectrum of threats. The app stays connected with our platform in the cloud to deliver efficient protection on the device that cannot be subverted and optimizes for processor speed and battery life.

The world's first mobile EDR solution. Delivered on the only platform built for mobile from the ground up.