Download Webinar

Watch Now

Thank You!

Thank you for registering for our live Lunch & Learn session. You will receive a confirmation e-mail shortly. We look forward to seeing you on Wednesday, April 26th.

Register Now

We're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat

A number of jurisdictions globally have recently banned TikTok, a popular social media app known to share user data with China, from government-issued devices. In February, the European Commission suspended the issue of TikTok on its corporate devices. In the UK, TikTok has been banned on government devices as part of wider app review, and this has also impacted on BBC staff who have been told to delete the app. In Germany, the Federal Office for the Protection of the Constitution sees considerable risks in the use of TikTok due to the volume of data collected. Therefore, TikTok is also under heavy scrutiny in Germany.

While the hype has been around this single app, the security consequences of mobile apps go far beyond just TikTok and the public sector. Mobile devices have become critical to how your employees access data and stay productive — especially with hybrid work. The recent news around TikTok is a good reminder and opportunity for you to evaluate the permissions of the apps your employees’ mobile devices have, what they do with data they can access, and how you can minimize the risk to your risk from mobile devices, including bring-your-own devices. 

Our security experts will discuss how to effectively stop phishing attacks at the mobile device level and restrict usage of apps like TikTok that pose a growing threat to your data and workforce.

We’ll discuss:

  • How has the meaning of Shadow IT evolved with the proliferation of web and mobile apps
  • Why having visibility into mobile apps and their behavior is critical
  • How to handle risks related to BYOD devices, including mobile endpoints
  • How to protect your data when your employees are looking for shortcuts to stay productive

As a thank you from Lookout, live participants will receive a voucher* to purchase lunch afterwards.

*Terms and Conditions: To be eligible, you must register for the Lookout webinar on 26 April 2023 via a legitimate corporate email address and attend the full session. Offer open only to UK, Ireland, Germany, Austria, and Switzerland residents. Lookout employees and Channel partners are not eligible. Attendees from Germany, Austria will receive a 15 EUR JUST EAT takeaway voucher. Attendees from Switzerland will receive a 15 CHF JUST EAT takeaway voucher. Attendees from UKI  will receive a £10 voucher.The voucher will be sent no later than 1 hour after the session. JUST EAT Takeaway and UBER Eats are not affiliated with Lookout, nor are sponsors of this promotion. JUST EAT Takeaway and the JUST EAT Takeaway logo are registered trademarks of UST EAT Takeaway. UBER Eats and the UBER Eats logo are registered trademarks of UBER Eats.


Michael Simpson
Endpoint to Cloud Specialist, Lookout
Franz Finke
Solutions Engineer, Lookout

You may also be interested in:

2023 Gartner® Critical Capabilities Security Service Edge (SSE)

Lookout scored among the highest three vendors in all Use Cases in the 2023 Gartner® Critical Capabilities Security Service Edge (SSE).

The State of Remote Work Security 2023

Organizations need a new approach to security so that they can keep pace with the way remote users access data and collaborate with each other.

Standalone Tools Create Complexity: Why You Need to Simplify Security

Read this e-book to learn how to streamline your security operations by implementing an integrated, platform-centric security solution.

Consolidating IT Security? Here’s Why You Need a Data-Centric Platform

Read this e-book to learn why Lookout’s endpoint-to-cloud approach is uniquely positioned to reduce the complexity of your IT security.

Excellent Add-On For Cloud Storage

Excellent company to work with, this product enabled wider cloud storage adoption for us by providing an option to encrypt data with separate keys.

Security and Risk Management

50M - 250M USD

Amazing CASB to Help With Data Security and DLP Integration

Lookout CASB is a great product. Out of all the products reviewed, it was the only product that allowed the data to be secured, regardless of location of endpoint or the data itself, as the security follows the data.

Security and Risk Management

Gov't/PS/ED 5,000 - 50,000 Employees

Easy and Effective Lookout Deployment

We deployed Lookout on a very small group of users, all company devices. Administration of policies and deployment is effortless compared to other products, and the footprint on devices is very small... Overall a very good experience.

Infrastructure and Operations

<50M USD

Businesses, governments, and millions of individuals around the world have trusted Lookout to safeguard their data.
Businesses worldwide
Individuals' personal data
Mobile devices
Mobile apps
SaaS apps
Threat families
Logo of Vodafone
Verizon Logo
AT&T Logo
Telefónica Logo
Google Logo
VMWare Logo