BYOD Increases Mobile Phishing Rates, and the Risks Have Never Been Higher

We've just published our Global State of Mobile Phishing report, which explores phishing trends and the risk they present to both your data and your financial bottom line.

New

Protecting Data and Promoting Collaboration During Times of Change

Organizations that try to keep using their perimeter-based security solutions are hindering their workers’ ability to collaborate while also losing a handle on their data.

Office 365 and Azure Exploited in Massive U.S Government Hack

According to SolarWinds filings with the SEC, the involved attackers were able to compromise the company’s Microsoft Office 365 emails with forged SAML tokens.

A New Approach to Data Security for the New Year

Going into 2023, your organization should be laser-focused on identity and data, and the technologies that secure these elements will have to evolve.

The Internet-Based Threats Putting Your Organization at Risk

As you embrace the productivity boost that comes with using the internet as your default corporate network, you need to stay vigilant against these internet-based threats.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

We're excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra, with the Lookout security service edge (SSE) solution.

New

From Access-centric Security to Data-centric Security

With millions of cloud apps, why would we want to use the same access-centric security approach for today's infrastructure that we used in the nineties?

New

Five Steps Towards Building a Better Data Security Strategy

A unified edge security platform can give you the visibility and control you need to create a modern and efficient architecture for protecting users, applications and data.

New

How to Mitigate Risks When Your Data is Scattered Across Clouds

As you transition to the cloud, it’s critical to have a security solution equipped to handle the risks. A unified cloud-delivered security platform is the best solution.

New

Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London

I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies.

New

My Journey Beyond the Perimeter: Why Firewalls Alone Can’t Protect Data

While firewalls are necessary, they aren’t sufficient. We need to evolve our security thinking from a perimeter, access control-centric view to a distributed data-centric one.

New

Fortify Your SD-WAN With SSE Integration

As organizations begin to combine legacy on-premises tools with cloud services, integrating SSE with existing SD-WAN will help address new cloud-based security challenges.

New

Protecting K-12 Student Data Requires a Comprehensive Security Solution

K-12 school systems must eliminate the patchwork of solutions that fail to meet the depth and breadth of security requirements that accompany digital education.

New

Higher Ed: Protecting Sensitive Data Requires a Unified Approach

Demands to protect systems and data are rising, as higher education institutions are now subject to more stringent cybersecurity and privacy expectations.

Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)

The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant full command.

Lookout Helps Leading Fintech Company Improve Compliance

See how Lookout helped a leading FinTech provider protect customer data and reach security compliance using Secure Cloud Access with DLP.

New

Gaining Visibility Into SaaS Apps To Secure Your Data

Software-as-a-Service (SaaS) apps have become essential to how most of us run our organizations and stay productive — especially over the last two years.

New

How a Hospital System Leverage Existing Investments With a Hybrid Approach

Lookout helped this large university health system augment their legacy DLP tool by extending their reach to the cloud so they can remain compliant.

How a Leading University Hospital Secures Patient Data

See how Lookout helped them protect their sensitive data and meet compliance regulations as they migrated to full cloud adoption.

How a Financial Services Firm Prevents Data Leakage with Lookout

This large financial services firm needed to ensure they were protecting data in email without increasing complexity or limiting productivity.

New
SAP

Securing SAP SuccessFactors – Protecting Human Capital

Organizations require tighter controls to protect their multi-cloud environments and data from potential data leaks or breaches due to misconfigurations.

New

Improving Data Security for SaaS Apps | CASB

Today’s security practitioners need practical guidelines and technical capabilities that support their expanding SaaS usage.

What To Consider When Assessing a CASB

Gartner found CASB to be the fastest-growing cyber security segment, with investment increasing by 41.2% (2021 CIO Agenda Survey).

Strengthening Cloud Security With SASE

Learn how to roll out a SASE deployment at scale while taking into account current security practices, trends, and pertinent questions that every security leader needs to ask.

Securing SAP SuccessFactors To Remain Compliant

Join us for this session to learn about how Lookout CASB is uniquely positioned through its partnership with SAP

Healthcare’s Post-Transformation Agenda

How does this new world of telehealth change how healthcare security leaders must view cybersecurity? Tom Field of Information Security Media Group discusses how.

SASE Strategy Guidebook

If you are looking to build your SASE Strategy for your entire organization’s using true cloud security protection, then you don't want to miss these handpicked insights.

Endpoint-to-Cloud Whitepaper

You need visibility and control of your data across users, devices and networks. See how Lookout is changing the mobile threat landscape today.

The Pharmaceutical Threat Report

Access the Pharmaceutical Threat Report to better understand the risks mobile devices have introduced into your organization with Lookout today.

Prevent Data Leakage From Productivity Tools

Hank Schless, Senior Manager of Security Solutions at Lookout, will be joined by guest speakers to help you navigate integrated endpoints to cloud security.

5 Best Practices for Achieving Zero Trust (Whitepaper)

Lookout has developed a guide that addresses unique challenges within various State and Local Government entities, and offers strategies for mitigating emerging threats.

Empowering Financial Services With a Secure Data Path

Visibility into mobile threats is key to protecting your valuable data from today's complex attacks. Discover more with Lookout today.

A Zero Trust Approach to Security for Healthcare

Find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – be it SaaS, IaaS or on-premise

The Authoritative Guide to the Top CASB Use Cases

This whitepaper will share insight into the key use cases and overview the benefits that provide a strong return on investment for CASB✛ users.

What Is Lookout Cloud Access Security Broker?

A cloud access security broker (CASB) offers the same visibility and control you’ve had with a traditional IT architecture, but now in a cloud model.

How a Leading University Hospital Secures Patient Data

Find out how one of the top 10 hospitals in the United States secured sensitive data in the cloud while maintaining compliance with Lookout.

How Does Secure Web Gateway Work

Can a Secure Web Gateway help secure my business’ data and workforce? Secure Web Gateway (SWG) protects web surfing users by filtering malware.

Lookout + Microsoft Azure Sentinel – Analytics Rule

Watch how lookout uses a sample analytics rule to allow you to create threat alerts and automatically create security incidents from within Microsoft Azure Sentinel.

Preventing Data Leakage to Personal Channels in Slack

See how Lookout prevents accidental data leakage to personal slack channels. With personal and enterprise channels often side-by-side, its easy to make this type of mistake.

Protecting Sensitive Data in Slack

See how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data and masking it so that it is not shared in plain text.

Airbus Deploys Lookout to >100,000 Global Workforce

Learn why Airbus selected Lookout Mobile Endpoint Security to protect its global fleet of >100,000 iOS and Android devices.

Secure Collaboration and Compliant Sharing in Slack

In this video you will see how Lookout can prevent an external user from being added to a private slack channel that contains sensitive data.

Protect Personal Data and Privacy in SAP SuccessFactors

Learn how you can get detailed visibility into your entire security infrastructure, along with data protection, cyberthreat detection and compliance management.

ShellClient RAT

Security researchers recently unveiled a long-standing campaign that was being carried out by a new Iranian threat actor known as MalKamak.

3 Tough Questions About Your Data Protection

Here are three questions to think about when it comes to protecting your on-premise data.

Why Do Companies Need a CASB?

Lookout CASB protects your users as they access the cloud on any device, both managed and unmanaged. Learn why your organization needs CASB.

Securing Office 365 for Financial Services Practioners

Understand how Lookout's integrated CASB and data protection approach directly addresses Office 365 email, collaboration, and infrastructure security requirements.

Total Protection for Salesforce

Lookout CASB+ for Salesforce provides unparalleled protection for your users and data, giving you complete control over user access, their activities and data access.

Securing Data Collaboration in Office 365 for Remote Workers

This whitepaper provides a clear view of emerging information security challenges for organizations that have adopted Office 365 as part of their remote collaboration strategy

Total Protection for ServiceNow

Lookout CASB+ for ServiceNOW provides unparalleled protection for your users and data, giving you complete control over user access, their activities and data access.

Integrating Security From Endpoint-to-Cloud

With data going wherever it’s needed, organizations require security that provides the visibility and control once existed inside the perimeter.

Cloud Enrollment and Policy Implementation

Overview of the cloud enrollment and policy implementation in the Lookout CASB Platform

DLP in Microsoft 365

Overview of data loss prevention for Microsoft 365 users in the Lookout CASB console

Encrypting and Obfuscating Data in Google Workspace

Overview of how sensitive data is obfuscated and encrypted in various use cases for Google Workspace users.

Sensitive Data Access in Google Workspace

Overview of how sensitive data sharing and restriction policies work in Google Workspace with Lookout CASB.

Proactive Strategies for Mobile Security

Securing your agency’s data starts by protecting your mobile endpoints.

Taylor Vinters Case Study

Taylor Vinters is an international law firm supporting the businesses which drive the innovation economy, and the entrepreneurs and private wealth that underpin them.

Cloud Access Security Broker (CASB)

Learn how implementing CASB technologies can protect your organizations data from known and unknown threats without violating privacy.

Advanced Data Loss Prevention (DLP)

Secure data from endpoint to cloud in a privacy respecting manner.

Lookout Cloud Key Security

Cloud key security management and storage of encryption keys can protect your mobile infrastructure connections across multiple virtual instances.

Mobile Apps Define Your Customers’ Experience

As customers use your app, your organization is handling sensitive financial, personal and health information. Learn why you need to embed app security.

Lookout Balances Security With Privacy

Learn how Lookout can secure your devices without needing to inspect content.

Global Pharmaceutical Leader Enables Conditional Access

The CISO of a leading pharmaceutical organization wanted to mitigate the data leakage and compliance risks from mobile devices accessing the company's research data.

US Armed Services Goes BYOD

Watch this video to find out how Avid Systems uses Lookout to enable military personnel to securely use their personal devices for work.

Top US National Bank Deploys Lookout Cloud Key Security

Learn how a leading financial organization uses Lookout secure cloud infrastructure to stay ahead of the ever-evolving threat landscape.

How Lookout Protects Employee Location Data

With the world’s largest mobile data set, the Lookout Cloud Security shows that more than 40% of new Android apps in 2019 collected specific user location data.

Lookout + AT&T FirstNet for Emergency Responders

By tampering with medical records and information systems, cybercriminals can have devastating effects on people in need of emergency care.

Lookout for Retailers

As more retail organizations embrace a cash register-less mode, in store retail is embracing the post-perimeter world.

Lookout Secures Global Pharma Organization

Learn how Lookout secures a global pharma company with 20,000 mobile endpoints.

How We Protect Pharmaceutical Companies

Secure your supply chain by protecting your mobile endpoints.

Lookout for Hospital Systems

Security teams must extend their security strategy from traditional endpoints out to the mobile devices that are used by staff to access patient charts and other PII.

Lookout Secures the Small Business Mobile Workforce

While they may recognize the risk, smaller organizations are focused on scaling the business, and can’t allocate large amounts of time to cybersecurity.

Post-Perimeter Security for Government

See surprising mobile device trends among federal employees and learn how to implement post-perimeter security at your organization.

How Lookout Protects Against iOS Jailbreaking

Jailbreaking gives users complete access to everything on the device and free reign to modify security and access settings as they would like.

How Lookout Secures Microsoft Teams

Lookout has integrated with Microsoft Intune to provide Continuous Conditional Access for mobile Office 365 apps like Outlook, Word, Excel, and PowerPoint.

How Lookout Protects Executives

Organization’s most sensitive data, financial performance, product pricing, and corporate development plans are regularly being accessed from smartphones and tablets.

How Lookout Protects Law Firm Client Cloud Data

A large amount of information law firms are required to keep confidential is accessed outside the four walls of a firm, outside the reach of traditional security tools.

Lookout for Government Field Agents

Systems accessed remotely by agents contain sensitive government data, which could be used to compromise the financial well-being, privacy, and identity of US citizens.

Why Deploying MTD and EMM Together Makes Sense

Employees are frequently working from mobile devices, organizations must provide mobile employees secure and flexible access to cloud-based enterprise data.

Schneider Electric Rapidly Deploys Security to Global Fleet

Learn how an organization with 50,000 mobile devices was able to seamlessly deploy and integrate mobile security.

Simon Hegele Case Study

Learn how Simon Hegele uses Lookout to secure thousands of devices all around the world and align with GDPR and other complex compliance standards.

Landis+Gyr Case Study

A leading smart meter manufacturer secures move to Microsoft Intune with Lookout to secure its deployment of Microsoft Office 365.

Henkel Case Study

Learn how a Fortune 500 company secured their mobile fleet and extended GDPR compliance to mobile with Lookout.

Healthcare System Achieves Secure Mobility With Lookout

Learn how a top 5 healthcare system in the U.S. achieved best-in-class mobile security by integrating Lookout with MobileIron EMM.

Greenhill & Co. Financial Case Study

Greenhill & Co secures the mobile devices of employees who travel on business to countries where mobile risks are more prevalent and sophisticated.

Boels Zanders Case Study

Discover how Boels Zanders, was able to guarantee secure access to sensitive data and align with Dutch and EU compliance standards with Lookout.

Lookout for Financial Services

As financial professionals increasingly conduct business from mobile devices, sensitive information continues to flow beyond the reach of traditional security perimeters.

Lookout for Healthcare

Security attacks are becoming more prevalent. It’s necessary to protect against these attacks while simultaneously strengthening the organization’s compliance posture.

Financial Services Company Customer Story

This Fortune 500 measurably reduced their mobile risk by remediating 200+ security incidents.