May 19, 2020

-
min read

Unified Endpoint Security: Lookout and VMware Carbon Black

We are excited to announce that Lookout, Carbon Black and VMware have come together to deliver a Unified Endpoint Security (UES) solution. With this UES solution, security teams can use a centralized dashboard to monitor the security of all endpoints accessing corporate resources – both mobile and fixed endpoints.

Previously, organizations have only been able to rely on unified endpoint management (UEM) to manage both fixed and mobile endpoints accessing the corporate network. However, endpoint management is not endpoint security.

While UEM excels at performing management functions, it lacks the ability to detect and respond to cyber threats. Without visibility into the security and health of their endpoints, organizations are left exposed as cyber-attackers relentlessly seek unprotected entry points into an organization that enables them to steal sensitive data.

Through a seamless integration with VMware Workspace ONE Intelligence, Lookout and Carbon Black provide consolidated security intelligence for both mobile and fixed endpoints to one centralized dashboard. From this dashboard, security and IT administrators can identify trends, triage threats and automate responses to mitigate those threats. The combination of mobile and fixed endpoint security intel offers a powerful view into the full kill-chain of attacks exploiting any type of endpoint.

Lookout and VMware Carbon Black integrate with VMware Workspace ONE to secure mobile and fixed endpoints for a comprehensive Unified Endpoint Security solution.

Carbon Black, acquired by VMware in 2019, is an industry leading next-generation endpoint protection solution securing desktops and laptops at scale. Carbon Black is a cloud-native solution well equipped to scale to the more than 500,000 VMware customers, and has an exceptional track record for its efficacy in defending against cyber attacks on fixed endpoints.

Lookout provides mobile endpoint security by leveraging artificial intelligence to analyze over 100 million apps and data from more than 180 million devices to deliver comprehensive threat protection from phishing, malicious apps, network-based, and device-based exploits. Founded in 2007, Lookout is the leader in mobile security, protecting the device at the intersection of the personal you and the professional you. Lookout enables consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust.

“Attacks on endpoints are becoming more and more platform agnostic. Threats like Dark Caracal are providing exploits and phishing attacks designed for both desktop and mobile endpoints. In addition, customers are seeking tools that allow them to defend against and monitor threats against their organization, regardless of which device is under attack.” - David Richardson, VP of Product Management, Lookout, Inc.

Together, Lookout, Carbon Black and VMware provide powerful unified visibility, detection and response across all endpoints – all from one powerful dashboard. To get the Workspace ONE dashboard today, joint Lookout-VMware customers need to request access from their VMware account manager.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.