Lookout Mobile Threat Protection enables enterprises to view and defeat app, network, and device-based threats.

Watch product preview

Lookout Mobile Threat Protection
What is Mobile Endpoint Security?

Lookout Mobile Threat Protection is the only enterprise mobile security solution that can anticipate and defeat the next generation of malware, network-based threats, and targeted attacks. With an easy-to-deploy endpoint agent on your employees’ devices, Lookout provides real-time threat data to a centralized admin console, enabling you to enforce security policies and protect against advanced attacks anywhere in the world, while maintaining the privacy of employees.

App-based threats

Protection from app-based threats

Malicious apps (malware) affect both iOS and Android devices. In order to coerce users into installing malware, attackers will frequently utilize phishing attacks, email, infected websites, in-app ads, push notification ads, and SMS messages. When installed on a smartphone or tablet, malware typically exploits vulnerabilities to gain full access to the device, steal data, monitor the device’s sensors, access protected Wi-Fi/VPN networks, or perform other malicious actions. Lookout Mobile Threat Protection is the only enterprise mobile security solution that can anticipate and defeat the next generation of app-based threats.

App-based threats include:

  • Trojans that can exfiltrate data from the device
  • Spyware that can monitor device sensors like the camera or calendar
  • Sideloaded apps that bypass official app store review

Learn more about app-based threats arrow_forward

Network-based threats

Protection from network-based threats

Attackers use a number of techniques to intercept network traffic to and from a mobile device, commonly called a man-in-the-middle attack. This type of attack is executed by getting access to network traffic and decrypting the sensitive information being transferred, despite strong encryption used by many enterprise solutions, such as email. On mobile devices, these attacks aim to get in the middle of data transferred over cellular and Wi-Fi networks. Lookout Network Protection provides automatic on-device analysis of network connections to defend against man-in-the-middle attacks and ensure information is being securely transmitted.

Lookout network protection detects man-in-the-middle attacks including:

  • Host Certificate Hijacking
  • SSLStrip
  • TLS Protocol Downgrade

Learn more about Lookout network protection arrow_forward

OS-based threats

Protection from device-based threats

iOS and Android, like their PC counterparts, contain vulnerabilities in their operating systems that can be exploited. If exploitation of an OS vulnerability leads to root or kernel-level privilege escalation, an attacker can then compromise any application on the device, including those that encrypt data at rest, such as enterprise containers. Attackers want to jailbreak (on iOS) or root (on Android) mobile operating systems because it gives them free reign of the compromised device and its operating system. Auto-rooting malware that combines adware with exploits that root the device has been a major rising trend over the past year, with a very high prevalence globally.

Lookout enables detection of prominent threats at the device level including:

  • Malicious root or jailbreak
  • End-user root or jailbreak
  • Malicious configuration profiles

See how Lookout protects against OS-based threats arrow_forward

Fortune 500 Financial Services Firm Case Study

Case Study

Fortune 500 Financial Services Firm

One of the world's largest investment management firms chose Lookout after being driven by an internal audit requirement to implement a mobile security solution on any Android or iOS device that has access to corporate resources. What they found was shocking. Over 3 percent of mobile devices had encountered a mobile threat, a rate of infection they had not seen in the desktop world since 2001.


Case Study Read Case Study

NDI

“The nature of our work unfortunately attracts cyber-criminals, but Lookout helps protect our mission and our people by allowing us to get ahead of advanced threats on mobile.”

Chris Spence
Former Chief Technology Officer of National Democratic Institute

Request a demo and see what Lookout can do for you.

Get Started call_made

Explore Other Products arrow_forward

Lookout protects phones, tablets, applications, mobile fleets, and more.

Personal

Solutions for all your personal devices.

Learn more arrow_forward

App Security

Solutions for building and deploying safer apps.

Learn more arrow_forward

Threat Intelligence

Deeper insights into the world's mobile threats.

Learn more arrow_forward

Personal

Solutions for all your personal devices.

Learn more arrow_forward

App Security

Solutions for building and deploying safer apps.

Learn more arrow_forward

Threat Intelligence

Deeper insights into the world's mobile threats.

Learn more arrow_forward
Close