Microsoft and Lookout are collaborating on the integration of Lookout’s Mobile Endpoint Security solution with Microsoft’s Windows Defender Advanced Threat Protection (WDATP).

Microsoft customers will gain comprehensive visibility and protection across the entire spectrum of mobile risk, specifically for threats to the app, device, network and web & content vectors. Now, WDATP users can leverage this integration across employee iOS and Android devices, and manage protecting their mobile fleet from within the WDATP Management Console.

Microsoft

"The integration between Lookout's mobile threat defense and Microsoft's WDATP service will provide an unprecedented level of visibility and response capability across the different device types enterprise customers must secure."

Moti Gindi, General Manager
Windows Cyber Defense, Microsoft

Lookout shares Microsoft’s vision of applying machine learning techniques to a large security dataset in order to rapidly detect and respond to new threats. Lookout has collected security data from over 150M devices worldwide, and has analyzed over 50 million iOS and Android apps using advanced machine learning techniques to identify risks on those platforms. This is in part why Microsoft has chosen to partner with Lookout.

How the integration works

When Lookout is deployed in an enterprise environment along with WDATP, a customer’s WDATP Windows device view is extended to include mobile device threats provided by Lookout. Mobile threat information will be integrated into the WDATP operator and analytics dashboards, as well as the “alerts” and “machine” screens, for a single pane of glass experience for security professionals.

The new integration simply requires an organization to have WDATP and Lookout deployed, and will be generally available by early 2018.

Want an early preview of this integration? Fill out the form below and we’ll be in touch.

All Fields Required

Lookout + Microsoft Enterprise Mobility + Security (EMS)

Learn more arrow_forward

Insights

Dig deeper into our mobile security research.

Read Insights arrow_forward

Suggestions

    Close