Select your Lookout Enterprise bundle

There is a bundle to meet your organization's requirements 

You have already done the complex work of defining your security requirements, so we have made it easy to find the Lookout enterprise security bundle that will meet your needs.


Lookout Security Platform

Modern Endpoint Protection
App Threat Protection
  • Malware: trojans, spyware, ransomware, surveillanceware, clickfraud and others
  • Detect rootkit exploits within apps that jailbreak or root device
  • Riskware: Adware, spam, chargeware
  • Detection for sideloaded apps
Essentials
Advanced
Premium
navigate_before
navigate_next
Device Threat Protection
  • Passcode enforcement
  • Device encryption enforcement
  • Jailbreak/root detection
  • Advanced detection for remote jailbreak/root
Essentials
Advanced
Premium
navigate_before
navigate_next
Network Threat Protection
  • Man-in-the-middle attacks on both cellular and Wi-Fi networks
  • Secure sockets layer (SSL) attacks
  • Rogue Wi-Fi access points
  • Address resolution protocol (ARP) spoofing detection
Essentials
Advanced
Premium
navigate_before
navigate_next
Integrations
  • Android Enterprise Dual Persona Protection
  • UEM integration for MDM and/or MAM support
  • Identity access management (IAM) integration
  • Security incident event management (SIEM) integration
  • Lookout Mobile Risk API
Essentials
Advanced
Premium
navigate_before
navigate_next
Continuous Conditional Access
  • On device data access controls
  • MDM access based controls
  • MAM access based controls
  • IAM access based controls
Essentials
Advanced
Premium
navigate_before
navigate_next
Phishing and Content Protection
Phishing and Content Protection
  • Block access to phishing links across all apps
  • Block malicious servers, command and control systems, and watering holes
  • AI powered detection of the latest phishing threats
  • Configurable privacy controls for admins
Essentials
Advanced
Premium
navigate_before
navigate_next
Web Content Filtering
  • Identify or block access to adult, violent, and criminal content
  • Approve sites for employee use
  • Block sites impacting productivity, performance, and mobile data costs
Essentials
Advanced
Premium
navigate_before
navigate_next
Mobile Risk and Compliance
Mobile App Reputation Services
  • Block untrusted applications
  • Identify apps accessing sensitive data such as calendar or contacts
  • Identify apps communicating with servers in foreign countries
  • Identify apps communicating with cloud services
  • Identify risky or malicious SDKs
  • Identify apps that have insecure data storage/transfer
  • Out of the box application risk grading
Essentials
Advanced
Premium
navigate_before
navigate_next
Data Protection Controls
  • Data privacy controls
  • Customizable app polices
  • Custom policies for risky apps
  • App allow lists and deny lists
  • Public and private app upload and analysis
Essentials
Advanced
Premium
navigate_before
navigate_next
Mobile Vulnerability and Patch Management
Mobile Device Vulnerability Management
  • Visibility into operating system versions
  • Require devices to run minimum OS version
  • Identify severity of vulnerabilities across fleet
  • Risky device configurations
  • Operating systems vulnerabilities
Essentials
Advanced
Premium
navigate_before
navigate_next
Mobile App Vulnerability Management
  • Identify and enforce use of updated apps
  • Drive users to update vulnerable apps
  • Block use of specific vulnerable app versions
Essentials
Advanced
Premium
navigate_before
navigate_next
Patch Management
  • Identify latest available patches and upgrades
  • View patch adoption across organization
  • Enforce patch deployments
Essentials
Advanced
Premium
navigate_before
navigate_next
Mobile Endpoint Detection and Response
Forensic Investigation
  • Threat hunting across your users' web content and apps
  • Research and investigation for incident response
  • Link incidents to larger campaigns or kill chains
Essentials
Advanced
Premium
navigate_before
navigate_next
Breach Protection
  • Proactive threat hunting across global app, threat, and web data
  • Execute new policy based on threat discoveries
Essentials
Advanced
Premium
navigate_before
navigate_next
Lookout Security Graph API
  • APIs for integrating Lookout Mobile EDR data to existing security tools
  • Correlate mobile threat IOCs with existing platform threat data
Essentials
Advanced
Premium
navigate_before
navigate_next
Included
Essentials
Advanced
Premium
Modern Endpoint Protection
Phishing and Content Protection
Mobile Risk and Compliance
Mobile Vulnerability and Patch Management
Mobile Endpoint Detection and Response