November 17, 2021
Lookout CASB Named Major Player in 2021
I am excited to share a major milestone for our company: the Lookout Cloud Access Security Broker (CASB) has been named a Major Player in the 2021 IDC MarketScape Worldwide Cloud Security Gateways (CSG) Vendor Assessment (Doc # US48334521, November 2021).
When Lookout acquired CipherCloud back in March 2021, the two companies came together with a mission to build a platform that provides intelligent Zero Trust access by leveraging in-depth telemetry from endpoint to cloud. With some of the most mature Secure Service Edge (SASE) and endpoint security technologies integrated into a single cloud-delivered platform, we achieved our first major integration milestone just a few months later.
It is very satisfying to see the IDC MarketScape validate Lookout for its Zero Trust solution that spans CASB, Zero Trust Network Access (ZTNA), Data Loss Prevention (DLP) and endpoint security.
As we have learned over the past 18 months, remote and hybrid work are here to stay. Organizations are increasingly relying on the cloud — Infrastructure-as-a-Service (IaaS) to run enterprise apps and software-as-a-service (SaaS) applications — to empower employees with the ability to access the data they need from any location and on any device. But this ease-of-access comes with new Zero Trust security requirements that can only be solved with an integrated endpoint-to-cloud security solution.
Data protection is the core of cloud security
The Cloud, IaaS and SaaS apps, offer the scalability, flexibility and reliability organizations need to meet their business goals. It also enables employees to work easily from anywhere. But as IDC points out in the MarketScape, the cloud also “represents a prime vector for pernicious data theft, unintentional data leakage, and regulatory violations.”
We completely agree with this statement and believe that protecting data from endpoint to cloud should be at the center of enterprise security. At its core, security means the ability to have full visibility into your data and the ability to control how it’s handled, regardless of the networks or endpoints used to access it. Lookout takes that even further. By leveraging telemetry of endpoints, users, networks, apps and data, we’ve built a platform that provides full visibility and control while safeguarding data intelligently without hindering productivity.
"Lookout [CASB] is a very powerful tool with some of the most advanced features in the marketplace."
- Chris Rodriguez, Network Security Products and Strategies Research Manager, IDC
We have invested a lot of time and energy with customers to create a CASB solution that focuses on protecting data and enabling productivity. To achieve this, we integrated our CASB into a broader SASE platform that includes ZTNA to secure private apps, endpoint security with detection and response capabilities to deal with threats and risks, advanced data protection and user behavior analytics technologies. Understanding that cloud security requires a holistic approach, the IDC MarketScape called out these native functionalities as strengths of the Lookout CASB.
Intelligent Zero-Trust access
It’s not just the breadth of coverage surrounding the Lookout CASB that sets our solution apart, Lookout Security Platform is built to deploy a modern Zero Trust architecture that takes advantage of integrated endpoint-to-cloud insights and machine intelligence. By leveraging deep telemetry from users, endpoints, networks, apps and data, we enable organizations to dynamically implement intelligent access policies that are fine-grained.
With full visibility, you are able to enforce policies based on both the fluctuating risk levels of users and endpoints as well as the sensitivity level of the data they seek to access. The result is an intelligent Zero Trust solution that is efficient and doesn’t get in the way of productivity.
Excels with advanced data protection
The other advantage of the Lookout CASB called out in the IDC MarketScape is our complete suite of data protection capabilities. With data centricity in mind, we have built-in technologies that most other CASBs don’t have. These include data loss prevention (DLP), exact data match (EDM), optical character recognition (OCR) and enterprise digital rights management (E-DRM).
Having these native functionalities, we can restrict access to data with varying degrees of granularity. For example, in addition to enabling or disabling downloading, we can take specific action on the data itself, such as redacting keywords, adding watermarking and applying encryption.
We also have advanced key management with bring-your-own-key (BYOK) abilities, enabling organizations to be in full control of their sensitive data across all cloud and SaaS applications.
Data-centric security requires an integrated SASE approach
As pointed out in the IDC MarketScape, the Cloud Security Gateway market is maturing and complementary technologies that were not previously considered CASB capabilities are converging. The remote-first work environment requires a different strategy. Not only are each SaaS apps unique, but users, endpoints as well as the networks they use all bring different security challenges.
In addition to Lookout CASB, our solutions have native data protection, user behavior analytics and endpoint security capabilities, enabling us to deploy intelligent Zero Trust access. With a unified SASE platform, we ensure organizations can efficiently safeguard their data and apps, whether they are private or in the cloud. With remote and hybrid work here to stay, organizations need an integrated approach that puts data protection at its forefront.
To provide a holistic approach to cybersecurity, the Lookout Security Platform provides complete visibility, granular and dynamic controls and real-time data and threat protection across any app and websites, regardless of the location or endpoints the employee uses.
Visit our Lookout CASB or Lookout SASE pages to learn more about our integrated approach to security.
Book a personalized, no-pressure demo today to learn:
- How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
- Real-world examples of phishing and app threats that have compromised organizations
- How an integrated endpoint-to-cloud security platform can detect threats and protect your organization