Discover how Lookout make security easy for the modern, mobile workplace.
Keep everything running smoothly through mergers and acquisitions.
Move to the cloud faster while improving security and productivity.
Everything you need to detect and mitigate threats in real time.
Workers and data are everywhere, your security should be too.
Collaborate securely and productively from anywhere in the world.
Workers and data are everywhere, your security should be too.
Protect student data without sacrificing privacy.
Meet demand for Zero Trust mandates with unified data protection.
Provide digital-first services while protecting customer data.
Protect patient data, minimize risk, and maximize compliance.
Protect valuable data and IP no matter where it goes.
Securely move to the cloud and safeguard mobile devices.
Learn about the data-centric technologies that power Lookout’s platform.
The capabilities you need to protect data no matter where it goes.
Detects and classifies data in real time, ensuring that you know what policies to enforce.
Protects your data even when it flows to applications and endpoints you don’t manage.
Identifies and secures cloud data across applications and services to reduce the risk of data exfiltration.
In-depth insights and uniform policy enforcement to effectively safeguard your data.
Monitors user activities and threats with precision, ensuring you're ready for any threats.
Streamlines security, making sure that data protection is consistent and effective.
Automates security analysis and decision-making processes.
We ensure that your data is protected, whether it’s from inbound web threats or software weaknesses in your mobile fleet.
Convicts phishing threats from any communications channels.
Protects your mobile fleet from vulnerabilities with AI and crowdsourced data.
Explore how we're creating the future of data security and ensuring peace of mind for all.
Data protection that lets businesses prosper.
Learn more about our leaders.
Creating positive impact in our communities.
Learn more about our customers.
Get in touch with our team.
Take your next career step alongside a diverse team built on a foundation of trust and innovative spirit.
Browse job openings and explore roles that are shaping the future of data security.
Find insights and information about keeping your data safe.
Find the latest community events, webinars, podcasts and more from Lookout.
Explore all business data security related resources to uncover information, insights, and more.
Enjoy our Security Soapbox podcast, listen in to learn about the latest threat intel and more.
Explore our many conversations with top industry leaders in cybersecurity.
View our ever growing library of informative videos, use-case explanations and more.
Meet our team and learn from cybersecurity experts in one of our upcoming events.
Stay up to date with the newest terminology and technologies in the space.
7 Essential Tips to Prevent Social Engineering
To prevent social engineering, you should educate your employees on common red flags and keep your hardware and software up to date.
Privacy vs. Mobile Security: Why You Don’t Have to Choose
Many people are resistant to putting an employee-mandated security app on their phone, but organizations don't have to sacrifice security for privacy.
Don’t Forget Mobile Security: How Mobile Devices Serve as Keys to the Cloud
To modern threat actors, mobile devices are the keys to the kingdom, providing a pathway for attackers to compromise your entire organization.
5 Trends That Are Changing the Landscape of Cybersecurity in 2024
If you want your organization to remain secure, it’s not enough to keep up with the trends — you need to be one step ahead.
Busting 6 Myths About Mobile Device Security
While most organizations have a robust cybersecurity strategy in place to protect their laptops and corporate networks, mobile devices are often left underprotected.
NIST 800-124 Cybersecurity Publication Revision: How to Implement Mobile Security
NIST recently released a comprehensive document offering valuable insights and guidelines for implementing robust mobile endpoint security solutions.
Enhancing Mobile Device Security: Applying the NIS2 Directive
In response to a changing threat landscape, the EU's NIS2 directive recommends mobile threat defense (MTD) solutions.
Top Mobile App Security Risks: From Risky Behavior to Hidden Malicious Code
TikTok to Pinduoduo and Temu are just some of the most recent examples of mobile app risks. Read this blog to learn about how you can protect your organization from them.
Lookout Powers VMware Workspace ONE Mobile Threat Defense (MTD)
Lookout and VMware recently announced the debut of Workspace ONE Mobile Threat Defense (MTD), a mobile security solution incorporating Lookout mobile protection technologies.
Critical Mobile Security Capabilities Everyone Needs
While away from the office, your workers are using their mobile devices to stay productive. So how do you secure your data in this new reality?
Lookout Named Best Mobile Security Solution by the SC Awards
I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.
Mobile Security Best Practices for Law Firms
Proper training will go a long way to reduce the risk to which your firm is exposed, as will having effective security in place.
Got MDM? Here Are Five Reasons Why You Still Need Mobile Security
MDM is a valuable component of an organization’s mobile strategy. But you also need mobile security to make sure your sensitive data is protected.
The Increasing Need for Mobile Security Among U.S. Federal Agencies
Employees are accessing sensitive data through their personal smartphones and tablets while they’re outside the protective perimeter of the office.
Lookout Partners With Trustonic To Bring Enhanced Mobile Security to Payment and Banking Applications
Lookout and Trustonic join to provide customers with protection from cyberthreats targeting banking, payment and other critical mobile transactions
Improve Mobile Security Now — Or It Could Be Mandated Later
The trend toward mobility is an essential part of fulfilling the government’s mission of service to the American public.
Lookout Brings Mobile Security to SentinelOne Customers
Together with Lookout, SentinelOne will now be able to offer organizations a way to secure mobile endpoints as thoroughly as they protect traditional endpoints.
Mobile Security at the Center of Federal Internet of Things (IoT)
The "Internet of Things Cybersecurity Improvement Act of 2017," ensures that vendors selling IoT devices to the U.S. government meet certain cybersecurity standards.
Better Federal Mobile Security — An Interview With Kiersten Todt
Over the past decade, the federal government has followed the rest of society in a general move towards mobility.
Forrester’s Now Tech Mobile Security Report: The 2018 Vendor Landscape
To achieve comprehensive security, enterprises must choose solutions that complement their existing security ecosystem. Forester’s new Now Tech report reinforces this fact.
Cloud-First, Device Assisted: A Layered Defense Model
Stopping these malicious actors requires the kind of long view, holistic effort that Lookout has employed with its unique "cloud-first, device assisted" approach.
Mobile Threat Defense: The Drawbacks of “On-Device” MTD Solutions
Understanding each vendor’s technology approach and philosophy behind these solutions and the real implications on cybersecurity effectiveness.
2017 Gartner Market Guide for Mobile Threat Defense
Gartner says that leaving mobile endpoints unsecured presents an urgent risk to corporate, government, and regulated personal data.
Lookout & DHS Partnership | Best Mobile Security for Govt. Agencies
Today, DHS S&T announced it is partnering with Lookout to enhance the powerful Lookout Mobile Endpoint Security solution for government agencies.
3 Insights From the Gartner Hype Cycle for Mobile Security 2017
Gartner recently released its July 2017 Hype Cycle for Mobile Security 2017, confirming that mobile threat defense (MTD) has matured as a key enterprise security technology.
Game on: Mobile Security Heats Up
When a sleeping giant suddenly wakes up and says, “We have to get into that market!” it serves as market validation that helps our market grow.
Q&A With Bob Stevens: Where Federal Agencies Are Putting Their Dollars in Mobile Security
Lookout VP of Federal Bob Stevens disusses how the Spectrum of Mobile Risk impacts government agencies and organizations.
EMM With Unified MTD + MARS Is the Best Practice for Mobile Security
Mobile security technology is moving towards a convergence of Mobile Threat Defense (MTD) and Mobile App Reputation Solutions (MARS).
The Convergence of the Mobile Threat Defense and Mobile App Reputation Market Is Good News for CISOs
In my conversations with CISOs, I repeatedly hear that one of the biggest issues they have is too many security products.
Presidential Commission on Enhancing National Cybersecurity: Prioritize Mobile Security Now
The Presidential Commission on Enhancing National Cybersecurity saying; de-prioritizing mobile security is no longer an option.
Holistic Mobile Security Means Protection From Threats, Data Leakage, and Your Own Applications
Mobile apps have become the primary way we access data, employees have wide control over their mobile environment, and you don’t know who developed those mobile apps.
Here’s What I Told the U.S. Chamber of Commerce About Mobile Security
Jim Dolce, Lookout CEO, had the great pleasure to speak at the U.S. Chamber of Commerce’s 5th Annual Cybersecurity Summit.
Now Available: The Practical Guide to Enterprise Mobile Security
The Practical Guide to Enterprise Mobile Security is a one-stop shop for enterprise IT teams looking to enable mobile productivity in their organizations.
5 Active Mobile Threats Spoofing Enterprise Apps
Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it's trouble for IT departments everywhere.
The Modern Kill Chain: How Attacks Have Gone From Months to Minutes
Cloud breaches are now happening in minutes, not months.
Exclusive Threat Briefing: CryptoChameleon Phishing Kit
Lookout discovered an active phishing kit, used to target governments and Coinbase. Learn how it avoids detection by traditional web analysis tools.
Understanding the Modern Kill Chain To Keep Data Secure in 2024
Get a behind-the-scenes look at two real-life attacks. Learn how attacks are evolving to target mobile users and actions to protect your data.
The Dangers of Advanced Persistent Threat (APT) Groups and What Enterprise Security Teams Need to Know
APTs are often thought of as primarily targeting governments for cyber espionage. However in reality, they could have just as much impact on the private sector.
How APT 41 Is Using Mobile Devices to Target Your Organization
Join us for this exclusive partner security briefing for a breakdown of these threats and to see why they are now targeting mobile devices.
Mobile Security for State and Local Agencies
Lookout Security expert Jose Garcia covers strategies for Mobile Endpoint Security and provides information on mobile security, BYOAD, and the emerging threat landscape.
New Guidance for Mobile Security
Hear from US federal CISO's on why they're adopting new guidance from NIST on how to best secure mobile users, particularly those working with sensitive government data.
5 Minute Friday: iLeakage- The Hidden Threat to Your iOS Device
On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device — the device that goes everywhere you do.
5 Minute Friday: Unveiling Infamous Chisel, Sandworm, and Deblind
Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel.
5 Minute Friday: Scattered Spider, MGM, and Caesars
Caesars Entertainment and MGM resorts were recently a target for a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target.
Soap Suds: Protect Your Data From Risky Apps Like TikTok
Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data.
The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware
With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security.
Threat Hunt With the Right Red Thread: Why You Need Mobile EDR
Offices are empty and people are working from home. Tablets and smartphones have become a primary way workers are staying productive. Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts.
Management Isn't Security: Why You Need More Than MDM
In this episode, we chat with our mobile security experts about mobile device management. Why is MDM in and of itself not security. What’s the best way to protect an organization’s smartphones and tablets? Listen in to find out.
What is a Mobile Threat?
Learn about the threats that exist for your mobile devices from the experts in mobile and endpoint security, Lookout.