More than half of the devices employees use to access your organization’s data run iOS, Android and Chrome OS. The problem is security on mobile devices is often overlooked, creating a gap in your security architecture.
Mobile operating systems are more locked down than their desktop counterparts. They do not permit kernel access and the ability to scan applications. Even if mobile endpoint protection could access the kernel, it would slow the processor too much and drain the battery as well as violate a mobile user’s expectation of privacy.
While these operating systems are more resilient, cyberattackers increasingly target them because they are at the intersection of our personal and professional life. iOS, Android and Chrome OS devices have a treasure trove of data and attackers are targeting them as the initial intrusion into your business.
A common attack vector uses mobile malware that may include spyware, banking trojans, and rootkits. Malware can be delivered through any of the cellular, Wi-Fi and Bluetooth connections of mobile endpoints. Once the malware is executed, it can undermine the overall safety of the endpoint.
Modern endpoint protection must detect threats in apps, the device and network connections. It must protect the user, the endpoint and the company while respecting privacy. It must work equally well for employee-owned and company-owned devices.
Protect mobile endpoints against app, device and network threats
To deliver modern endpoint protection, Lookout developed cloud-centric behavior-based detection capabilities. We perform behavioral analysis on telemetry data from nearly 200 million devices and over 120 million apps in the Lookout Security Graph. This analysis enables us to deliver efficient protection with a lightweight app on the device that optimizes for processor speed and battery life.
By evaluating app and system behaviors, our AI hunts for tell-tale signs of app, device or network threats on a mobile device. In addition, continuously monitoring changes to the endpoint enables detection of risks that span from jailbreaking or rooting a device to advanced device compromise.
With insight into both real-time changes on a device and the aggregate view of behavior across the broader mobile ecosystem, Lookout endpoint protection can detect zero-day threats that have never been seen before. The result is comprehensive modern endpoint protection that secures the devices your employees use the most from evolving threats.
Mobile security that integrates well
Some organizations manage their employee’s mobile endpoints with tools like mobile device management (MDM) or unified endpoint management (UEM). Lookout integrates with MDM and UEM to simplify the enrollment process of these devices.
Our integration with MDM and UEM as well as mobile application management (MAM) enables you to use Lookout as an integral part of your Zero Trust strategy. Lookout continuously monitors the risk profile of the device, apps and network connections. MDM, UEM and MAM software use the Lookout real-time risk assessment called Continuous Conditional Access to dynamically modify the access permissions to protect your data from risk.
Lookout also integrates with most security information and event management (SIEM) systems. Using standard syslog and common event format integration, comprehensive mobile telemetry can be correlated with data from other systems in your security architecture. The result is a complete dataset to enable threat investigations.