Mobile Endpoint Security
Since 2007, Lookout has specialized in mobile security and addresses this challenge with a machine-learning approach and data from over 23 million scanned apps worldwide.
As a result of partnerships with leading mobile network providers like Deutsche Telekom, Orange, Sprint and AT&T, which preinstall Lookout on their Android devices, as well as API cooperations with the biggest app stores, Lookout has access to a network of 100 million sensors, which give globally invaluable insights into malware incidences and additional information for the early detection of threats.
Lookout protects from the third generation of mobile threats
Many organizations are now embracing the use of smartphones and tablets to increase productivity in the workplace. However, this era of mobility introduces new risks to enterprise data. Lookout Mobile Endpoint Security enables secure mobility by providing comprehensive risk management across iOS and Android devices to protect against app, network, and device-based threats while providing visibility and control over data leakage.
Spectrum of mobile risk
Mike Murray (VP of security intelligence) talks about:
- What is the full spectrum of mobile risks
- Mobile security best practices
- How everyday employee behaviors can jeopardize your data, systems, and compliance policies
How the lookout suit works?
Lookout Mobile Endpoint Security leverages a lightweight endpoint app on employee devices, a cloud-based admin console that provides realtime visibility into threats and data leakage, and integration with leading Enterprise Mobility Management (EMM) solutions.
Mobile Endpoint Security for Threats
As more sensitive data is accessed by mobile devices, they are increasingly becoming a target for attackers. Lookout Mobile Endpoint Security identifies mobile threats targeting these primary attack vectors:
- App-based threats: Malware, rootkits, and sideloaded apps
- Network-based threats: Man-in-the-middle attacks
- Device-based threats: Jailbroken/rooted mobile devices
Mobile Endpoint Security for App Risks
Some iOS and Android apps are not malicious, but they exhibit sensitive behaviors that may leak data, contravening the security policy of an organization or even violate regulatory requirements around data loss. Lookout provides comprehensive visibility into these app risks within your mobile fleet, enabling admins to both monitor and set actionable policies against apps at risk of violating internal or regulatory requirements.
Economic risk of mobile threats and data security breaches
According to a current report by the Ponemon Institute, last year breaches of data security and cyber threats virtually crippled a large number of companies.
News headlines at the time showed first-hand the repercussions these threats have both on the people affected, as well as on the profit and business operations of companies. The report sheds light on the economic risk of mobile threats and mobile data security breaches, i.e. the costs that are incurred by the companies, and the reasons why many organizations have vulnerabilities as far as the protection from mobile threats is concerned.
According to cyber security specialist Lookout: “The mobile workforce is dragging companies into a world where 24/7 access to cloud-based services from anywhere in the world is a basic requirement. Employees are demanding flexibility. They want simultaneous access to professional apps like Salesforce and personal apps like Facebook,” says Gert-Jan Schenk, VP of Lookout EMEA. “When you talk to IT and security leaders, their number one concern is balancing mobility with security. It is critical that they get security right from the outset, particularly in light of the financial and reputational consequences if they don’t.”
Lookout Mobile Threat Protection offers protection from and insights into:
- Advanced malware divided into 18 different, clearly identified malware categories like Trojans, surveillanceware, riskware, etc.
- Sideloaded apps on iOS (fake or unauthorized enterprise certificates)
- Network attacks like man-in-the-middle attacks and root CAs
- Devices that have been jailbroken or rooted
- Exploits like Stagefright
- Non-compliant apps, which for example copy corporate data onto servers abroad (fully automated implementation of blacklist policies)
Security alerts can be managed via existing MDM solutions like MobileIron, and compliance actions can be defined and automatically executed. There is a particular emphasis on the simple operation of the Lookout app, in order to increase its acceptance among employees.
Have you got questions?
If you have any questions, please do not hesitate to contact us. Call us at +49 221 / 474 55-0 or write a mail. We will help you soon.