New

Protecting Data and Promoting Collaboration During Times of Change

Organizations that try to keep using their perimeter-based security solutions are hindering their workers’ ability to collaborate while also losing a handle on their data.

Office 365 and Azure Exploited in Massive U.S Government Hack

According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.

A New Approach to Data Security for the New Year

Going into 2023, your organization should be laser-focused on identity and data, and the technologies that secure these elements will have to evolve.

The Internet-Based Threats Putting Your Organization at Risk

As you embrace the productivity boost that comes with using the internet as your default corporate network, you need to stay vigilant against these internet-based threats.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

We're excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra, with the Lookout security service edge (SSE) solution.

New

From Access-centric Security to Data-centric Security

With millions of cloud apps, why would we want to use the same access-centric security approach for today's infrastructure that we used in the nineties?

New

Five Steps Towards Building a Better Data Security Strategy

A unified edge security platform can give you the visibility and control you need to create a modern and efficient architecture for protecting users, applications and data.

New

How to Mitigate Risks When Your Data is Scattered Across Clouds

As you transition to the cloud, it’s critical to have a security solution equipped to handle the risks. A unified cloud-delivered security platform is the best solution.

New

Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London

I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies.

New

My Journey Beyond the Perimeter: Why Firewalls Alone Can’t Protect Data

While firewalls are necessary, they aren’t sufficient. We need to evolve our security thinking from a perimeter, access control-centric view to a distributed data-centric one.

New

Fortify Your SD-WAN With SSE Integration

As organizations begin to combine legacy on-premises tools with cloud services, integrating SSE with existing SD-WAN will help address new cloud-based security challenges.

New

Protecting K-12 Student Data Requires a Comprehensive Security Solution

K-12 school systems must eliminate the patchwork of solutions that fail to meet the depth and breadth of security requirements that accompany digital education.

New

Higher Ed: Protecting Sensitive Data Requires a Unified Approach

Demands to protect systems and data are rising, as higher education institutions are now subject to more stringent cybersecurity and privacy expectations.

Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)

The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant full command.

New

Lookout Helps Leading Fintech Company Improve Data Security with CASB

See how Lookout helped a leading FinTech provider protect customer data and reach security compliance with CASB and DLP.

New

Gaining Visibility Into SaaS Apps To Secure Your Data

Software-as-a-Service (SaaS) apps have become essential to how most of us run our organizations and stay productive — especially over the last two years.

New
SAP

Securing SAP SuccessFactors – Protecting Human Capital

Organizations require tighter controls to protect their multi-cloud environments and data from potential data leaks or breaches due to misconfigurations.

New

Improving Data Security for SaaS Apps | CASB

Today’s security practitioners need practical guidelines and technical capabilities that support their expanding SaaS usage.

How to Build an Effective Data Security Strategy

Learn the key requirements you need to build an effective data security strategy.

Top Five Risks When Operating in the Cloud

Now that you’re operating in the cloud you need to be aware of the data security risks and take the appropriate steps to mitigate them.

Google + Lookout | Data Security For Your Cloud

Watch this webinar and hear case studies that exhibit how Lookout and Google partner to protect customers.

Building A Data-Centric Security Strategy for Your Business

Users and the applications they depend on are more widely distributed than ever, and threats continue to evolve. But “lock it down” no longer works for your business.

4 Steps to Reduce Ransomware in a Cloud First World

Today, nearly 8% of all data breaches involve ransomware, with an average cost of $4.62 million (USD).Organizations need to protect their most valuable asset: data.

Protect Enterprise Data in the Cloud From Ransomware

Ransomware is not a new threat, but attackers' tactics to access your infrastructures and steal resources have evolved. The scale of attacks has increased because of this.

2022 Gartner® Magic Quadrant™ for Security Service Edge

Security service edge (SSE) converges cloud-centric security capabilities to facilitate secure access to the web, cloud services (SaaS), and private applications.

SAP SuccessFactors: Best Practices To Stay Compliant

Organizations everywhere rely on SAP SuccessFactors and its leading cloud-based human capital management (HCM) platform to recruit, evaluate, and manage employees.

CASB Buyer’s Guide

CASBs deliver cloud-specific security capabilities that traditional perimeter-focused products can’t. IT leaders need to understand what they are getting with a CASB product.

Protect Cloud Data in the Wake of the Pfizer Data Leak

We often associate breaches with corporate espionage and threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has actually amplified security gaps.

2022 Gartner® Critical Capabilities for Security Service Edge

The Gartner Critical Capabilities for Security Service Edge is a comparative analysis that scores products or services against a set of differentiators identified by Gartner.

What To Consider When Assessing a CASB

Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey).

What Is Lookout Cloud Access Security Broker?

A cloud access security broker (CASB) offers the same visibility and control you’ve had with a traditional IT architecture, but now in a cloud model.

How a Leading University Hospital Secures Patient Data

Find out how one of the top 10 hospitals in the United States secured sensitive data in the cloud while maintaining compliance with Lookout.

How Does Secure Web Gateway Work

Can a Secure Web Gateway help secure my business’ data and workforce? Secure Web Gateway (SWG) protects web surfing users by filtering malware.

Lookout + Microsoft Azure Sentinel – Analytics Rule

Watch how lookout uses a sample analytics rule to allow you to create threat alerts and automatically create security incidents from within Microsoft Azure Sentinel.

Protecting Sensitive Data in Slack

See how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data and masking it so that it is not shared in plain text.

Preventing Data Leakage to Personal Channels in Slack

See how Lookout prevents accidental data leakage to personal slack channels. With personal and enterprise channels often side-by-side, its easy to make this type of mistake.

Secure Collaboration and Compliant Sharing in Slack

In this video you will see how Lookout can prevent an external user from being added to a private slack channel that contains sensitive data.

Airbus Deploys Lookout to >100,000 Global Workforce

Learn why Airbus selected Lookout Mobile Endpoint Security to protect its global fleet of >100,000 iOS and Android devices.

Protect Personal Data and Privacy in SAP SuccessFactors

Learn how you can get detailed visibility into your entire security infrastructure, along with data protection, cyberthreat detection and compliance management.

ShellClient RAT

Security researchers recently unveiled a long-standing campaign that was being carried out by a new Iranian threat actor known as MalKamak.

3 Tough Questions About Your Data Protection

Here are three questions to think about when it comes to protecting your on-premise data.

Total Protection for Salesforce

Lookout CASB+ for Salesforce provides unparalleled protection for your users and data, giving you complete control over user access, their activities and data access.

Securing Data Collaboration in Office 365 for Remote Workers

This whitepaper provides a clear view of emerging information security challenges for organizations that have adopted Office 365 as part of their remote collaboration strategy

Securing Office 365 for Financial Services Practioners

Understand how Lookout's integrated CASB and data protection approach directly addresses Office 365 email, collaboration, and infrastructure security requirements.

Why Do Companies Need a CASB?

Lookout CASB protects your users as they access the cloud on any device, both managed and unmanaged. Learn why your organization needs CASB.

Total Protection for ServiceNow

Lookout CASB+ for ServiceNOW provides unparalleled protection for your users and data, giving you complete control over user access, their activities and data access.

Integrating Security From Endpoint-to-Cloud

With data going wherever it’s needed, organizations require security that provides the visibility and control once existed inside the perimeter.

Cloud Enrollment and Policy Implementation

Overview of the cloud enrollment and policy implementation in the Lookout CASB Platform

Encrypting and Obfuscating Data in Google Workspace

Overview of how sensitive data is obfuscated and encrypted in various use cases for Google Workspace users.

DLP in Microsoft 365

Overview of data loss prevention for Microsoft 365 users in the Lookout CASB console

Sensitive Data Access in Google Workspace

Overview of how sensitive data sharing and restriction policies work in Google Workspace with Lookout CASB.

Proactive Strategies for Mobile Security

Securing your agency’s data starts by protecting your mobile endpoints.

Taylor Vinters Case Study

Taylor Vinters is an international law firm supporting the businesses which drive the innovation economy, and the entrepreneurs and private wealth that underpin them.

Cloud Access Security Broker (CASB)

Learn how implementing CASB technologies can protect your organizations data from known and unknown threats without violating privacy.

Advanced Data Loss Prevention (DLP)

Secure data from endpoint to cloud in a privacy respecting manner.

Lookout Cloud Key Security

Cloud key security management and storage of encryption keys can protect your mobile infrastructure connections across multiple virtual instances.

Mobile Apps Define Your Customers’ Experience

As customers use your app, your organization is handling sensitive financial, personal and health information. Learn why you need to embed app security.

Lookout Balances Security With Privacy

Learn how Lookout can secure your devices without needing to inspect content.

Lookout Protects Against Mobile Phishing Threats

Alex Gladd, Principal Product Manager at Lookout discussed why it is important to have visibility into phishing threats and how Lookout Phishing and Content protection can help

Global Pharmaceutical Leader Enables Conditional Access

The CISO of a leading pharmaceutical organization wanted to mitigate the data leakage and compliance risks from mobile devices accessing the company's research data.

US Armed Services Goes BYOD

Watch this video to find out how Avid Systems uses Lookout to enable military personnel to securely use their personal devices for work.

Top US National Bank Deploys Lookout Cloud Key Security

Learn how a leading financial organization uses Lookout secure cloud infrastructure to stay ahead of the ever-evolving threat landscape.

How Lookout Protects Employee Location Data

With the world’s largest mobile data set, the Lookout Cloud Security shows that more than 40% of new Android apps in 2019 collected specific user location data.

How We Protect Pharmaceutical Companies

Secure your supply chain by protecting your mobile endpoints.

Lookout + AT&T FirstNet for Emergency Responders

By tampering with medical records and information systems, cybercriminals can have devastating effects on people in need of emergency care.

Lookout for Hospital Systems

Security teams must extend their security strategy from traditional endpoints out to the mobile devices that are used by staff to access patient charts and other PII.

Lookout Secures Global Pharma Organization

Learn how Lookout secures a global pharma company with 20,000 mobile endpoints.

Lookout for Retailers

As more retail organizations embrace a cash register-less mode, in store retail is embracing the post-perimeter world.

Lookout Secures the Small Business Mobile Workforce

While they may recognize the risk, smaller organizations are focused on scaling the business, and can’t allocate large amounts of time to cybersecurity.

Post-Perimeter Security for Government

See surprising mobile device trends among federal employees and learn how to implement post-perimeter security at your organization.

How Lookout Protects Against iOS Jailbreaking

Jailbreaking gives users complete access to everything on the device and free reign to modify security and access settings as they would like.

How Lookout Protects Executives

Organization’s most sensitive data, financial performance, product pricing, and corporate development plans are regularly being accessed from smartphones and tablets.

How Lookout Protects Law Firm Client Cloud Data

A large amount of information law firms are required to keep confidential is accessed outside the four walls of a firm, outside the reach of traditional security tools.

Lookout for Government Field Agents

Systems accessed remotely by agents contain sensitive government data, which could be used to compromise the financial well-being, privacy, and identity of US citizens.

How Lookout Secures Microsoft Teams

Lookout has integrated with Microsoft Intune to provide Continuous Conditional Access for mobile Office 365 apps like Outlook, Word, Excel, and PowerPoint.

Why Deploying MTD and EMM Together Makes Sense

Employees are frequently working from mobile devices, organizations must provide mobile employees secure and flexible access to cloud-based enterprise data.

Schneider Electric Rapidly Deploys Security to Global Fleet

Learn how an organization with 50,000 mobile devices was able to seamlessly deploy and integrate mobile security.

Simon Hegele Case Study

Learn how Simon Hegele uses Lookout to secure thousands of devices all around the world and align with GDPR and other complex compliance standards.

Landis+Gyr Case Study

A leading smart meter manufacturer secures move to Microsoft Intune with Lookout to secure its deployment of Microsoft Office 365.

Henkel Case Study

Learn how a Fortune 500 company secured their mobile fleet and extended GDPR compliance to mobile with Lookout.

Greenhill & Co. Financial Case Study

Greenhill & Co secures the mobile devices of employees who travel on business to countries where mobile risks are more prevalent and sophisticated.

Healthcare System Achieves Secure Mobility With Lookout

Learn how a top 5 healthcare system in the U.S. achieved best-in-class mobile security by integrating Lookout with MobileIron EMM.

Boels Zanders Case Study

Discover how Boels Zanders, was able to guarantee secure access to sensitive data and align with Dutch and EU compliance standards with Lookout.

Lookout for Financial Services

As financial professionals increasingly conduct business from mobile devices, sensitive information continues to flow beyond the reach of traditional security perimeters.

Lookout for Healthcare

Security attacks are becoming more prevalent. It’s necessary to protect against these attacks while simultaneously strengthening the organization’s compliance posture.

Financial Services Company Customer Story

This Fortune 500 measurably reduced their mobile risk by remediating 200+ security incidents.