The General Data Protection Regulation (GDPR)
will come into effect on 25 May 2018.

Don't let mobile be a forgotten endpoint in your GDPR preparations

The evidence of GDPR noncompliance risk
from mobile is overwhelming.

84% of enterprises are already at risk

Security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

63% of apps access personal data

Enterprise employees say they access their organization’s customer, partner, and employee data while on their mobile device.

31% of attackers target business leaders

Enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

84% of enterprises are already at risk

Security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

63% of apps access personal data

Enterprise employees say they access their organization’s customer, partner, and employee data while on their mobile device.

31% of attackers target business leaders

Enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

Mobile Risk Assessment

Learn where your mobile risks and potential compliance infringements are

Complete this online mobile risk assessment to get insight into your current level of mobile risk based on your mobility policies and existing controls such as EMM. This assessment is based on a framework called the Mobile Risk Matrix, outlining risk across threats, software vulnerabilities, and risky behaviors & configurations for each of the attack vectors on mobile devices.

Get a custom assessment of GDPR and business risks to personal data by answering 20 questions about the state of mobility in your organization.

get your mobile risk assesment

You're invited:
Finding risks to GDPR compliance on mobile

December 14th, 2017 at 9am PT

headshot 1

OneTrust Chief Executive Officer

Kabir Barday

headshot 1

OneTrust Chief Executive Officer

Kabir Barday

headshot 2

Lookout Chief Strategy Officer

Aaron Cockerill

headshot 2

Lookout Chief Strategy Officer

Aaron Cockerill


How Lookout addresses key
requirements of GDPR

Quickly identify the risks to EU personal data from mobile

Lookout Mobile Endpoint Security provides unmatched visibility to quickly pinpoint when EU personal data is at risk of being exposed on mobile devices. The Lookout console enables admins to quickly identify risks to personal data within their mobile fleet from threats, risks or vulnerabilities across the app, device, network or web/content vectors.

Prepare for GDPR's 72 hour breach notification requirements

Lookout Mobile Endpoint Security provides timely notifications to administrators when data may be maliciously exfiltrated or accidentally leaked from a mobile device, arming administrators with detailed information about the identified issue within the Lookout console to enable notification to the supervisory authority “without undue delay.”

Implement policy-based protection at scale

Lookout provides policy templates to protect EU personal data, enabling organizations to mitigate the risk of data-leaking apps at scale, while ensuring end user privacy. Integrate Lookout Mobile Endpoint Security with your MDM / EMM to establish risk-based conditional access policies to secure GDPR regulated data.

Privacy by Design

Lookout adheres to data minimization and purposeful data collection principles, and has robust privacy controls, including the ability to restrict collection of any PII associated with users or devices under management as well as limit end user information presented to administrators of the Lookout solution. Lookout is EU-U.S. Privacy Shield, ISO27001, and FedRAMP In Process.

Finding GDPR noncompliance on mobile The clear and concise guide to securing personal data on mobile devices

This white paper examines the GDPR regulations and how the mobile threats, vulnerabilities and user behaviors related to mobile technology can have a significant impact on companies’ efforts to be compliant. It describes how technology solutions can help organizations not only comply with GDPR, but significantly enhance their mobile security posture as well.

Learn more arrow_forward

Healthcare provider Buurtzorg achieves compliance by securing 8,000 iPads for remote nurses

See how renown Dutch home healthcare organization Buurtzorg achieved all the goals of their mobile security initiative by integrating Lookout Mobile Endpoint Security with MobileIron Enterprise Mobility Management to secure mobility, enable compliance with privacy regulations, and gain visibility into mobile threats.

Get case study arrow_forward

By 2019, 30% of organizations will face signicant financial exposure from regulatory bodies due to their failure to comply with GDPR requirements to protect personal data on mobile devices.*

Gartner,​ ​Inc.,​ ​Revisit Your Enterprise Mobility Management Practices to Prepare for EU GDPR,​
​Manjunath Bhat, Bart Willemsen, May​ ​2017.​

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

*Gartner,​ ​Inc.,​ ​Revisit Your Enterprise Mobility Management Practices to Prepare for EU GDPR,​ ​Manjunath Bhat, Bart Willemsen, May​ ​2017.​ ​The​ ​Gartner​ ​Report(s)​ ​described​ ​herein,​ ​(the​ ​"Gartner​ ​Report(s)")​ ​represent(s) research​ ​opinion​ ​or​ ​viewpoints​ ​published,​ ​as​ ​part​ ​of​ ​a​ ​syndicated​ ​subscription​ ​service,​ ​by Gartner,​ ​Inc.​ ​("Gartner"),​ ​and​ ​are​ ​not​ ​representations​ ​of​ ​fact.


Get more insights arrow_forward

Mobile security insights


Prepare for GDPR with Lookout Mobile Endpoint Security

Now is the time to invest in security measures to safeguard sensitive employee, customer and...

Datasheet Get datasheet


Gartner Market Guide for Mobile Threat Defense

Employees are demanding access to corporate data through mobile devices, leading mobile threat...

Analyst Report Download Report


The Mobile Enterprise: Where the risk is bigger than bad apps, phishing, and malware

In this data-based report, you'll benefit from a comprehensive overview of the real-world risk...

Whitepaper Read Research Report

Suggestions

    Close