The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security protections. Securing data in the post-perimeter world requires organizations to move critical security capabilities to endpoints, and establish continuous conditional access to data based on risk.
"Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020."
-Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Each element of post-perimeter security works together to enable enterprises to protect data from threats and risks present on endpoints. Through continuous conditional access, it enables enterprises to constantly assess device health and allow employees to authenticate to corporate resources over any network. This works across all of your organizations' endpoints while protecting employee privacy.
Lookout enables post-perimeter security by monitoring risk at the endpoint, including phishing threats, to provide continuous conditional access to corporate resources. This happens only when there is an acceptable level of risk, and the device is in compliance with policy.
"Securing mobile endpoints is definitely a priority for us. We see Lookout as a critical layer of protection, both to prevent compromise of our corporate data, and to maintain compliance with all privacy laws."
Christian Jösch, Network Administrator, Simon Hegele
Phishing is the biggest unsolved cybersecurity challenge enterprises face today. Phishing is evolving as the mobile device provides new vectors for attack including SMS, social media apps, messaging apps, and readily available access to email. As a result, mobile users are three times more likely to fall for phishing scams, according to IBM.
In order to ensure comprehensive security across all employee endpoints, enterprises must first understand the Spectrum of Mobile Risk. This, in conjunction with the Mobile Risk Matrix, is a framework security leaders can use to understand the complex attack vectors and components associated with a mobile device.