Securing Collaboration in the Wake of the Cloud

Rachel Wilson, Head of Data Security at Morgan Stanley Wealth Management discusses how to protect enterprise data when collaborating in the cloud.

New

Security Service Edge: How to Detect & Mitigate Cyber Threats

The third episode in a webinar series on Security Service Edge (SSE), discussing how to detect and mitigate cyber threats.

Google + Lookout | Data Security For Your Cloud

Watch this webinar and hear case studies that exhibit how Lookout and Google partner to protect customers.

New

​​The Freedom Of Control: Enable Your Business While Minimizing Risk

Control. For decades, it’s been the mandate for Enterprise IT teams. Put it behind firewalls. Don’t let it slip onto personal devices. But everything has changed.

Building A Data-Centric Security Strategy for Your Business

Users and the applications they depend on are more widely distributed than ever, and threats continue to evolve. But “lock it down” no longer works for your business.

4 Steps to Reduce Ransomware in a Cloud First World

Today, nearly 8% of all data breaches involve ransomware, with an average cost of $4.62 million (USD).Organizations need to protect their most valuable asset: data.

Securing Productivity from Anywhere

As we adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.

Cloud Applications: A Zero Trust Approach to Energy

Accelerated adoption of the cloud has driven energy organizations to rely more heavily on cloud-based productivity suites and apps that access data from anywhere.

New

Cutting Through The Buzzwords: What Is Security Service Edge (SSE)?

In this webinar, we’ll cut through the buzzwords and acronyms, clearing up any confusion about how SSE delivers secure connectivity and access to data to stay productive.

Ransomware Attack Myths and How To Mitigate Risk

Learn how can protect your data from being held hostage from Microsoft Chief Security Advisor, Sarah Armstrong-Smith and Lookout Chief Strategy Officer, Aaron Cockerill.

5 Best Practices for Achieving Zero Trust (Webinar)

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

Address Today’s OMB Cybersecurity Directive

Educate government agencies on how to meet the requirements of each OMB directive and mitigate risk while allowing critical initiatives such as remote work.

Protect Enterprise Data in the Cloud From Ransomware

Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. The scale of attacks has increased because of this.

Ransomware: A Cloudy Forecast

Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved.

Protect Cloud Data in the Wake of the Pfizer Data Leak

We often associate breaches with corporate espionage and threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has actually amplified security gaps.

New

Best Practices for a Successful SASE Deployment

In this webinar, we will distill Lookout’s SASE journey into best practices that every organization can apply.

What To Consider When Assessing a CASB

Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey).

Securing SAP SuccessFactors To Remain Compliant

Join us for this session to learn about how Lookout CASB is uniquely positioned through its partnership with SAP

How We Secure Your Data by Integrating Mobile and Cloud Security

See how Lookout provides visibility into mobile threats to help you support compliance and prevent breaches with our integrated access controls which can assess telemetry.

Half a Bitcoin To Get Your Data Back? How To Defeat Ransomware Attacks

The third episode in the Achieving Endpoint-to-Cloud Security series welcomes Magda Chelly, Head of Cyber Consulting, Former CISO, Founder of Women in Cybersecurity.

Prepare for the Next Phase of Work-Anywhere Security

Listen to this 30-minute fireside chat for answers on: How can a Zero Trust approach be used to solve the current security challenges?

Prevent Data Leakage From Productivity Tools

Hank Schless, Senior Manager of Security Solutions at Lookout, will be joined by guest speakers to help you navigate integrated endpoints to cloud security.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

A Zero Trust Approach to Security for Healthcare

Find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – be it SaaS, IaaS or on-premise

Empowering Financial Services With a Secure Data Path

Visibility into mobile threats is key to protecting your valuable data from today's complex attacks. Discover more with Lookout today.

Lookout + CipherCloud: The Future of Cloud-Delivered Security

The need for an integrated endpoint-to-cloud security solution is accelerated by the proliferation of remote users. Join us to learn more.

Critical Capabilities for Mobile Vulnerability Management

As organizations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

Zero Trust – Securing the Remote Enterprise

We don’t need to be in the office to stay productive anymore. Cloud apps and mobile devices have enabled us to connect to work from anywhere.

Understanding Chromebook Security

Google Chromebooks are a popular choice for students and employees looking for an affordable laptop to browse the web and connect to their cloud applications.

Mobile Devices Are Leaving the Door Open to Cyberattackers

Your employees are using personal mobile devices for work and corporate mobile devices for personal use - an attack on a mobile device is an attack on your corporate data.

Lunch and Learn – Where Does Mobile Fit Into Security Frameworks?

Lookout hosted a lunch and learn discussion on how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies.

A First Look at Mobile EDR – Threat Hunting in Motion

Get a first look at new tools for security researchers to identify risks and threats on mobile devices for today's cross platform attacks.

Unified Endpoint Security for a Fully Remote World

With organizations going remote, the reliance on unified endpoint management (UEM) for both fixed and mobile endpoints accessing the corporate network is now the focus.

Trends and Statistics for Mobile Phishing in the Enterprise

Employees working outside of their corporate perimeters, coupled with the shift to cloud-based services, opens a whole new door of vulnerabilities. Namely, phishing threats.

Apps Under Attack – What You Need To Know

Lookout Threat Discovery and how you can protect yourself from compromise.

The Latest Guidance To Secure Mobile Devices

NIST has released Special Publication (SP) 800-124: Guidelines for Managing the Security of Mobile Devices in the Enterprise.

Protecting Mobile Point of Sale (MPoS) & Financial Apps

Learn how the Lookout App Defense Solution is protecting leading mPOS providers, mobile banking and finance/fintech apps from cyber threats.

Remote Work Is Here To Stay. How Do You Get Back to Business?

It’s likely that many of your employees will choose to work from where they feel the safest – outside the office. In other words, remote work is here to stay.

Securing Telework From 2020 and Beyond

As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?

Lookout & Microsoft Integration for a Secure Mobile Workforce

Leveraging the Microsoft Endpoint Manager App Protection with Lookout capability, organizations can provide secure access to O365 and Teams apps from personal devices.

How Are Attackers Targeting Mobile Devices?

With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity. Join Lookout and Eurofins to learn from the hacker's perspective.

Secure Your Mobile Workforce

Allowing employees to work productively from any device and any location can open users to the risks that come with the shared nature of a mobile device.

Finding Risks to GDPR Compliance in a Mobile-First World

The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

New

Platform Featuring World’s First Mobile EDR Solution

Mobile security allows you to regain visibility into all the devices your employees use, to protect corporate data, while maintaining employee privacy.

Critical Requirements for Mobile Security

Mobile devices are at the intersection of your work and personal lives, from the moment you wake up to when you go to sleep. How do you protect these enterprise endpoints?

No items found.