Download Webinar
Watch Now
Thank You!
Thank you for registering for our live Lunch & Learn session. You will receive a confirmation e-mail shortly. We look forward to seeing you on Wednesday, April 26th.
Register NowWe're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat
A number of jurisdictions globally have recently banned TikTok, a popular social media app known to share user data with China, from government-issued devices. In February, the European Commission suspended the issue of TikTok on its corporate devices. In the UK, TikTok has been banned on government devices as part of wider app review, and this has also impacted on BBC staff who have been told to delete the app. In Germany, the Federal Office for the Protection of the Constitution sees considerable risks in the use of TikTok due to the volume of data collected. Therefore, TikTok is also under heavy scrutiny in Germany.
While the hype has been around this single app, the security consequences of mobile apps go far beyond just TikTok and the public sector. Mobile devices have become critical to how your employees access data and stay productive — especially with hybrid work. The recent news around TikTok is a good reminder and opportunity for you to evaluate the permissions of the apps your employees’ mobile devices have, what they do with data they can access, and how you can minimize the risk to your risk from mobile devices, including bring-your-own devices.
Our security experts will discuss how to effectively stop phishing attacks at the mobile device level and restrict usage of apps like TikTok that pose a growing threat to your data and workforce.
We’ll discuss:
- How has the meaning of Shadow IT evolved with the proliferation of web and mobile apps
- Why having visibility into mobile apps and their behavior is critical
- How to handle risks related to BYOD devices, including mobile endpoints
- How to protect your data when your employees are looking for shortcuts to stay productive
As a thank you from Lookout, live participants will receive a voucher* to purchase lunch afterwards.
*Terms and Conditions: To be eligible, you must register for the Lookout webinar on 26 April 2023 via a legitimate corporate email address and attend the full session. Offer open only to UK, Ireland, Germany, Austria, and Switzerland residents. Lookout employees and Channel partners are not eligible. Attendees from Germany, Austria will receive a 15 EUR JUST EAT takeaway voucher. Attendees from Switzerland will receive a 15 CHF JUST EAT takeaway voucher. Attendees from UKI will receive a £10 voucher.The voucher will be sent no later than 1 hour after the session. JUST EAT Takeaway and UBER Eats are not affiliated with Lookout, nor are sponsors of this promotion. JUST EAT Takeaway and the JUST EAT Takeaway logo are registered trademarks of UST EAT Takeaway. UBER Eats and the UBER Eats logo are registered trademarks of UBER Eats.
Speakers:
You may also be interested in:

2023 Gartner® Critical Capabilities Security Service Edge (SSE)
Lookout scored among the highest three vendors in all Use Cases in the 2023 Gartner® Critical Capabilities Security Service Edge (SSE).

The State of Remote Work Security 2023
Organizations need a new approach to security so that they can keep pace with the way remote users access data and collaborate with each other.

Standalone Tools Create Complexity: Why You Need to Simplify Security
Read this e-book to learn how to streamline your security operations by implementing an integrated, platform-centric security solution.

Consolidating IT Security? Here’s Why You Need a Data-Centric Platform
Read this e-book to learn why Lookout’s endpoint-to-cloud approach is uniquely positioned to reduce the complexity of your IT security.
Excellent Add-On For Cloud Storage
Excellent company to work with, this product enabled wider cloud storage adoption for us by providing an option to encrypt data with separate keys.
Security and Risk Management
50M - 250M USD
Amazing CASB to Help With Data Security and DLP Integration
Lookout CASB is a great product. Out of all the products reviewed, it was the only product that allowed the data to be secured, regardless of location of endpoint or the data itself, as the security follows the data.
Security and Risk Management
Gov't/PS/ED 5,000 - 50,000 Employees
Easy and Effective Lookout Deployment
We deployed Lookout on a very small group of users, all company devices. Administration of policies and deployment is effortless compared to other products, and the footprint on devices is very small... Overall a very good experience.
Infrastructure and Operations
<50M USD