New

Predictions 2022: Work-From-Anywhere Brings End of On-Premise Security

I believe that in 2022 we will see the beginning of the end of on-premises security tools, as isolated, point solutions running in data centers.

New

ZTNAs Address Requirements VPNs Cannot. Here’s Why.

As work from anywhere continues, it is important to rethink how to provide access for your entire organization in a secure manner.

New

Code Blue: Healthcare Security in the Age of 5G and Remote Work

Why were hospitals so frequently breached by attacks? To answer that question, I turned to an old friend of Lookout — former CISO Mike Murray.

Mission Possible: Kiersten Todt on Securing the Public Sector

I recently had the pleasure of having Kiersten Todt, Managing Director of the Cybersecurity Readiness Institute, on the Endpoint Enigma podcast.

The Federal Office Has a New Look: Here’s How to Keep it Secure

To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.

Shadow IT Shaken With a Mobile Twist

In the strictest sense, most of us are operating a shadow IT operation. As we continue to work from home, each of us is using networks that our IT teams have no control over.

Back to School? Secure Your Chromebooks!

Chromebooks have become an essential tool for schools that transitioned to distance learning in the spring. These devices are a cost-effective alternative for students.

New

Work Is No Longer Tethered to the Office. Neither Should Security.

While work no longer revolves around an office space, security still does for many organizations. it’s time for us to fundamentally rethink how we secure our organizations.

New

The Next Normal Is Emerging

As we look past the current shelter-in-place measures, a “new normal” is expected to emerge where more of us work remotely most of the time or even all the time.

New

How to Embrace Mobility in Response to a Remote Workforce

Because of Coronavirus, organizations may want to rush into adopting a BYOD program so that employees can work more effectively from home. But what about the new risks?

New

How to Pragmatically Embrace Mobility in Response to a Remote Workforce

The Coronavirus has impacted businesses and employees in a myriad of ways, and one common thread is the sudden need for employees to work remotely.

Building A Data-Centric Security Strategy for Your Business

Users and the applications they depend on are more widely distributed than ever, and threats continue to evolve. But “lock it down” no longer works for your business.

Telework Exposed to Heightened Mobile Risk

Lookout data reveals that U.S. government organizations are exposed to hundreds of vulnerabilities from outdated operating systems and risky apps which steal credentials.

Prepare for the Next Phase of Work-Anywhere Security

Listen to this 30-minute fireside chat for answers on: How can a Zero Trust approach be used to solve the current security challenges?

Secure BYOD for Office 365

To balance personal and business use, firms need mobile security strategies that support productivity, safeguard data, and address employee resistance to corporate oversight.

3 Key Considerations: Maintain Agency Cybersecurity in the BYOD Era

As agencies begin to contemplate the possibility of a more permanent telework culture, how can government successfully secure remote employees for the long-term?

Zero Trust – Securing the Remote Enterprise

We don’t need to be in the office to stay productive anymore. Cloud apps and mobile devices have enabled us to connect to work from anywhere.

Securing Your Remote Workforce

How can you provide continuous protection for your corporate data as it is accessed by Office 365/Google Workspace apps on personal devices?

Unified Endpoint Security for a Fully Remote World

With organizations going remote, the reliance on unified endpoint management (UEM) for both fixed and mobile endpoints accessing the corporate network is now the focus.

IDC MarketScape: Mobile Threat Management Software

Mobile threat management (MTM) is evolving into a mainstream method to secure smartphones, tablets, etc. Learn why IDC named Lookout a leader three years in a row.

Remote Work Is Here To Stay. How Do You Get Back to Business?

It’s likely that many of your employees will choose to work from where they feel the safest – outside the office. In other words, remote work is here to stay.

Securing Telework From 2020 and Beyond

As public and private industries shift to telework, thanks to long-term innovation and short-term necessity, it’s clear that telework is here to stay. But to what scale?

Security That Works Everywhere You Go (Datasheet)

How can you empower your workers to safely stay productive? Find out.

Is 2022 the Beginning of the End of On-Prem Security?

Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year.

Lookout CASB Protects Your Business

Cloud apps allow us to stay productive from anywhere, but it comes with the risk of your data being exposed. See how Lookout Cloud Access Security Broker (CASB) can help.

Productivity Suites Like Office 365 Are Vital to How Work Remotely

Lookout helps businesses scale mobile security as employees go remote.

CISOs Guide for Securing the Remote Workforce

This white paper will share the key organization pain points to maintain data security and compliance in remote work environments, and the top CASB use cases to address them

Why It’s Time To Move On From VPNs

On this week’s Endpoint Enigma, Lookout CTO of SASE Products Sundaram Lakshmanan joins Hank Schless to discuss why VPNs fall short, and what the best alternative is.

Cloud Enrollment and Policy Implementation

Overview of the cloud enrollment and policy implementation in the Lookout CASB Platform

Healthcare Security in the Age of 5G and Remote Work

On this week’s Endpoint Enigma, Mike Murray, CEO of Scope Security discusses what healthcare looks like in the age of 5G and our work-from-anywhere world.

Cybercriminals Want Your Organization’s Login Credentials

Read why government agencies need protection against endpoint threats.cDownload the infographic now to get the stats

Threat Hunt With the Right Red Thread

Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts.

The Supply Chain Reaction

Alex Gladd, Principal Product Manager joins us to talk about why you can’t stop breaches without including mobile devices as part of your threat hunting efforts.

Securely Enable Your Employees

Learn how Continuous Conditional Access can secure your organization regardless of where your employees choose to work.

How We Empower Your Attorneys to Securely Telecommute

Lookout protects your legal practice against mobile and phishing attacks.

For a Secure Remote Workforce

In this pilot episode our guest, David Richardson will expose some of those threats and review the challenges and solutions to quickly adapt to a secure remote workforce.

Lookout and Microsoft Secure BYOD for Office 365

To balance personal and business use, firms need mobile security strategies that support productivity, safeguard data, and address employee resistance to corporate oversight.

Three Ways Employees Are Putting Your Organization at Risk

Employees in government organizations use iOS, Android and ChromeOS devices to stay productive and increase productivity as they telework.