Download Webinar

Watch Now

Thank You!

Thank you for registering for our live Lunch & Learn session. You will receive a confirmation e-mail shortly. We look forward to seeing you on Wednesday, April 26th.

You will be receiving
Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat
via email shortly. If you do not receive the email, please check your spam folder and consider white listing Lookout. If the document did not reach your inbox, please contact us at
Thank you for registering for our live Lunch & Learn session. You will receive a confirmation e-mail shortly. We look forward to seeing you on Wednesday, April 26th.

We're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat

A number of jurisdictions globally have recently banned TikTok, a popular social media app known to share user data with China, from government-issued devices. In February, the European Commission suspended the issue of TikTok on its corporate devices. In the UK, TikTok has been banned on government devices as part of wider app review, and this has also impacted on BBC staff who have been told to delete the app. In Germany, the Federal Office for the Protection of the Constitution sees considerable risks in the use of TikTok due to the volume of data collected. Therefore, TikTok is also under heavy scrutiny in Germany.

While the hype has been around this single app, the security consequences of mobile apps go far beyond just TikTok and the public sector. Mobile devices have become critical to how your employees access data and stay productive — especially with hybrid work. The recent news around TikTok is a good reminder and opportunity for you to evaluate the permissions of the apps your employees’ mobile devices have, what they do with data they can access, and how you can minimize the risk to your risk from mobile devices, including bring-your-own devices. 

Our security experts will discuss how to effectively stop phishing attacks at the mobile device level and restrict usage of apps like TikTok that pose a growing threat to your data and workforce.

We’ll discuss:

  • How has the meaning of Shadow IT evolved with the proliferation of web and mobile apps
  • Why having visibility into mobile apps and their behavior is critical
  • How to handle risks related to BYOD devices, including mobile endpoints
  • How to protect your data when your employees are looking for shortcuts to stay productive

As a thank you from Lookout, live participants will receive a voucher* to purchase lunch afterwards.

*Terms and Conditions: To be eligible, you must register for the Lookout webinar on 26 April 2023 via a legitimate corporate email address and attend the full session. Offer open only to UK, Ireland, Germany, Austria, and Switzerland residents. Lookout employees and Channel partners are not eligible. Attendees from Germany, Austria will receive a 15 EUR JUST EAT takeaway voucher. Attendees from Switzerland will receive a 15 CHF JUST EAT takeaway voucher. Attendees from UKI  will receive a £10 voucher.The voucher will be sent no later than 1 hour after the session. JUST EAT Takeaway and UBER Eats are not affiliated with Lookout, nor are sponsors of this promotion. JUST EAT Takeaway and the JUST EAT Takeaway logo are registered trademarks of UST EAT Takeaway. UBER Eats and the UBER Eats logo are registered trademarks of UBER Eats.



Michael Simpson
Endpoint to Cloud Specialist, Lookout
Franz Finke
Solutions Engineer, Lookout

You may also be interested in:

Secure Data and Access for Remote Collaboration

The unprecedented shift to remote working environments has challenged organizations to adopt cloud-based collaboration tools to maintain business continuity.

CASB Buyer’s Guide

CASBs deliver cloud-specific security capabilities that traditional perimeter-focused products can’t. IT leaders need to understand what they are getting with a CASB product.

Protecting Data and Achieving Compliance in Hybrid Cloud Environments

As healthcare organizations move to supporting remote work for clinical and business staff, they’ll need to find ways to reduce cybersecurity risks.

Strengthening Cloud Security With SASE

Learn how to roll out a SASE deployment at scale while taking into account current security practices, trends, and pertinent questions that every security leader needs to ask.

Excellent Add-On For Cloud Storage

Excellent company to work with, this product enabled wider cloud storage adoption for us by providing an option to encrypt data with separate keys.

Security and Risk Management

50M - 250M USD

Amazing CASB to Help With Data Security and DLP Integration

Lookout CASB is a great product. Out of all the products reviewed, it was the only product that allowed the data to be secured, regardless of location of endpoint or the data itself, as the security follows the data.

Security and Risk Management

Gov't/PS/ED 5,000 - 50,000 Employees

Easy and Effective Lookout Deployment

We deployed Lookout on a very small group of users, all company devices. Administration of policies and deployment is effortless compared to other products, and the footprint on devices is very small... Overall a very good experience.

Infrastructure and Operations

<50M USD

Businesses, governments, and millions of individuals around the world have trusted Lookout to safeguard their data.
Enterprises protected
URLs analyzed
Mobile devices scanned
Mobile apps scanned
SaaS apps analyzed
Threat families identified
Logo of Vodafone
Verizon Logo
AT&T Logo
Telefónica Logo
Google Logo
VMWare Logo