Download Webinar

Watch Now

Thank You!

Thank you for registering for our live Lunch & Learn session. You will receive a confirmation e-mail shortly. We look forward to seeing you on Wednesday, April 26th.

You will be receiving
Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat
via email shortly. If you do not receive the email, please check your spam folder and consider white listing Lookout. If the document did not reach your inbox, please contact us at info@lookout.com
Thank you for registering for our live Lunch & Learn session. You will receive a confirmation e-mail shortly. We look forward to seeing you on Wednesday, April 26th.

We're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Register Now

Jan 10th at
8:00 am PT | 11:00 am  ET
5:00 pm CET | 4:00 pm GMT

Host:

Speakers:

Michael Simpson
Endpoint to Cloud Specialist, Lookout
Franz Finke
Solutions Engineer, Lookout

Register Now

Host:

Speaker:

Speakers:

Michael Simpson
Endpoint to Cloud Specialist, Lookout
Franz Finke
Solutions Engineer, Lookout

On November 22, 2023, Broadcom Inc. completed its acquisition of VMware, Inc.,  and on December 7, 2023, Broadcom CEO Hock Tan announced his intention to  divest the End-User Computing Division (EUC).  Global investment firm KKR announced on February 26, 2024, that it has signed a definitive agreement with Broadcom to acquire the EUC Division.  Learn more about the pending acquisition.

Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat

A number of jurisdictions globally have recently banned TikTok, a popular social media app known to share user data with China, from government-issued devices. In February, the European Commission suspended the issue of TikTok on its corporate devices. In the UK, TikTok has been banned on government devices as part of wider app review, and this has also impacted on BBC staff who have been told to delete the app. In Germany, the Federal Office for the Protection of the Constitution sees considerable risks in the use of TikTok due to the volume of data collected. Therefore, TikTok is also under heavy scrutiny in Germany.

While the hype has been around this single app, the security consequences of mobile apps go far beyond just TikTok and the public sector. Mobile devices have become critical to how your employees access data and stay productive — especially with hybrid work. The recent news around TikTok is a good reminder and opportunity for you to evaluate the permissions of the apps your employees’ mobile devices have, what they do with data they can access, and how you can minimize the risk to your risk from mobile devices, including bring-your-own devices. 

Our security experts will discuss how to effectively stop phishing attacks at the mobile device level and restrict usage of apps like TikTok that pose a growing threat to your data and workforce.

We’ll discuss:

  • How has the meaning of Shadow IT evolved with the proliferation of web and mobile apps
  • Why having visibility into mobile apps and their behavior is critical
  • How to handle risks related to BYOD devices, including mobile endpoints
  • How to protect your data when your employees are looking for shortcuts to stay productive

As a thank you from Lookout, live participants will receive a voucher* to purchase lunch afterwards.

*Terms and Conditions: To be eligible, you must register for the Lookout webinar on 26 April 2023 via a legitimate corporate email address and attend the full session. Offer open only to UK, Ireland, Germany, Austria, and Switzerland residents. Lookout employees and Channel partners are not eligible. Attendees from Germany, Austria will receive a 15 EUR JUST EAT takeaway voucher. Attendees from Switzerland will receive a 15 CHF JUST EAT takeaway voucher. Attendees from UKI  will receive a £10 voucher.The voucher will be sent no later than 1 hour after the session. JUST EAT Takeaway and UBER Eats are not affiliated with Lookout, nor are sponsors of this promotion. JUST EAT Takeaway and the JUST EAT Takeaway logo are registered trademarks of UST EAT Takeaway. UBER Eats and the UBER Eats logo are registered trademarks of UBER Eats.

Host:

Speakers:

Michael Simpson
Endpoint to Cloud Specialist, Lookout
Franz Finke
Solutions Engineer, Lookout

You may also be interested in:

3 Reasons VPNs Can’t Protect Your Private Apps and Data

3 Reasons VPNs Can’t Protect Your Private Apps and Data Learn the three reasons why virtual private networks (VPN) are becoming obsolete, and what modern options you have to protect your people, data, and cloud-based apps.

2024 Gartner® Critical Capabilities Security Service Edge (SSE)

The Gartner Critical Capabilities for SSE — an essential companion to the 2024 Gartner Magic Quadrant™ for Security Service Edge, can be used to compare product or service offerings against a set of critical differentiators to support strategic decisions.

Secure Data and Access for Remote Collaboration

The unprecedented shift to remote working environments has challenged organizations to adopt cloud-based collaboration tools to maintain business continuity.

CASB Buyer’s Guide

CASBs deliver cloud-specific security capabilities that traditional perimeter-focused products can’t. IT leaders need to understand what they are getting with a CASB product.

Really Good Solution To Identify And Protect Sensitive Information

Based on my experience with the product, it has successfully met the expectations set by manufacturer. The integration process is straightforward, and it works smoothly with our cloud service.

Industry: Consumer Goods

Function: IT

Firm Size: 50M - 250M USD

Modular And Reliable Service With A Great Support

great support, very good planning for the rollout, step by step approach to guarantee business continuity

Industry: Retail

Function: Head of IT

Firm Size: 50M - 250M USD

Detect malicious activity at all levels on mobile devices

Lookout mobile endpoint provides services that solves ever-growing need for advanced security for mobile devices that are most vulnerable to attacks as user tends to open various links/website across any Wi-Fi. Using the platform malicious activity can be easily detected.

Industry: Software

Function: Engineering - Other

Firm Size: 3B - 10B USD

Businesses, governments, and millions of individuals around the world have trusted Lookout to safeguard their data.
2000+
Enterprises protected
400m
URLs analyzed
215m
Mobile devices scanned
290m
Mobile apps scanned
16.5k
SaaS apps analyzed
1500
Threat families identified
Logo of Vodafone
Verizon Logo
AT&T Logo
Telefónica Logo
Google Logo
VMWare Logo