Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout

Mobile EDR for security professionals by security professionals

In case you missed it, Lookout just announced something that I’m super excited about – the introduction of threat hunting and research into the Lookout Security Platform. The reason this is so satisfying is because we are enabling organizations to use the same tools our security analysts have been using for years.

Lookout partners with Google to deliver Zero Trust and BeyondCorp vision for mobile devices

Productivity suites have changed the way we work With the advent of cloud productivity platforms, tablets and smartphones have become an integral part of our work and personal lives. At any time, we are one tap away from accessing the same content as our desktop computers. In some ways, mobile devices have replaced those traditional devices as our main productivity tool. To borrow a line from a current ad campaign for tablets – “your next computer is not a computer.”

Shadow IT shaken with a mobile twist

If you bring up the topic of “shadow IT” to your head of IT, you will likely get a lecture about how employees need to follow protocol when using cloud cloud services so they don’t put the organization at risk. They’re not wrong. Without proper protection, unsanctioned tools can have significant consequences and unintentionally introduce security gaps.

Back to school? Secure your Chromebooks!

Here at Lookout, we spend a lot of time talking about how best to secure tablets and smartphones. That’s because they dominate our lives. But as some of our daily routines continue to stay virtual and our kids return to school, the importance of securing Chromebooks has become top of mind. Chromebooks have become an essential tool for schools that transitioned to distance learning in the spring.

Why the IDC MarketScape named Lookout a mobile threat management software leader three years in a row

The IDC MarketScape for Mobile Threat Management Software just named Lookout a leader for the third consecutive year. Everyone at Lookout works hard to make sure we provide the best mobile security for our customers, so it’s incredibly satisfying to have the MarketScape recognize our capabilities and strategies. We’re honored for the recognition of our capabilities for the third consecutive year.

Work is no longer tethered to the office. Neither should security be.

The coronavirus pandemic forced the world’s workforce to retreat from their offices in a hurry. In that process, it proved something many of us already knew: employees can work productively without needing to be physically present or connected to the corporate network. Assisted by cloud-based productivity apps, tablets and smartphones have untethered us from the office space. At any time, I can pull out my phone and resume working via the cloud.

Post-perimeter security 101: Dawn of a borderless world

The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.

A Non-Partisan Threat: Cybersecurity and its Impact on Democracy

As part of Cybersecurity Awareness Month, Lookout held a special briefing sponsored by Rep. Ted Lieu and Rep. Jim Longevin, that focused on how cybersecurity attacks can impact the entire democratic process -- from political campaigns and elections to journalists, lobbyists and activists that participate in the process. The session included a live demo of how a cyberattack could happen on a mobile device.