Lookout Joins the VMware Workspace ONE Trust Network To Secure Enterprise MobilityDownload Case Study
Lookout is proud to expand its alliance with VMware Workspace ONE as a member of the newly announced Trust Network.
Core to securing a perimeter-less enterprise is understanding the risk posture of devices seeking access to enterprise apps and SaaS. And in the modern digital workspace, the preferred device for accessing enterprise resources is increasingly a smartphone or tablet. With Lookout's breadth of data on mobile threats and risks, Workspace ONE customers can confidently incorporate mobile device risk into their calculations for trusted access.
With unmatched mobile threat detection capabilities and insights from the Lookout Mobile Risk Matrix, enterprise customers will now be able to maximize the benefits of workplace mobility. Enterprises can expect increased employee productivity and efficiency, while feeling confident that company assets, including data, intellectual property, and sensitive employee information remain safe from malicious attacks and threats.
The Lookout Mobile Risk Matrix is based on ten years of research into mobile threats and vulnerabilities, and helps organizations identify potential threats, vulnerabilities, and compromising configuration issues across the four key mobile risk vectors: app, device, network, and web & content.
By having the ability to identify the full Spectrum of Mobile risk in real time, including severity and prevalence, organizations can isolate and remediate according to company needs, policy, and compliance regulations.
As a partner in The Trust Network, Lookout will provide access control to customers based on a device encountering a threat or risk. When Lookout detects a risk on a device the enterprise customer will be able to use VMWare to block that device from accessing corporate assets.
Here are a couple real-world scenarios of how this collaboration works:
Control access based on threats from malicious apps. When malicious apps such as malware are detected on an organization's devices, the company can block devices from accessing corporate assets, including corporate email, cloud services, network folders and company apps, until the threat is resolved.
Control access based on threats to network. When threats to an enterprise network such as man-in-the-middle attacks (MITM) are detected by Lookout, the organization can protect access to WiFi networks based on specific device risk.
Control access based on compliance of mobile apps. When an app that engages in a behavior that violates a corporate or compliance policy (e.g., sending data to an unauthorized cloud service) is present on a device, the organization can restrict access to corporate resources until the device is brought back into compliance.
As a partner in The Trust Network working together with VMWare, Lookout continues its commitment to pushing secure enterprise mobility forward. This partnership will allow today's organizations to get visibility into the entire spectrum of mobile risk, apply policies to measurably reduce that risk, and do it all from a cohesive and integrated platform.
To learn more about how Lookout and VMWare Workspace ONE work together, check out this video and blog: Remediating Risk: How VMware Workspace ONE & Lookout Secure Enterprise Mobility.