A New Approach to Data Security for the New Year

Going into 2023, your organization should be laser-focused on identity and data, and the technologies that secure these elements will have to evolve.

New

A Security Work Stream Is Critical to IT Modernization

IT cloud modernization is a great way to drive sales growth, have the edge over your competitors, and boost your employees’ productivity while enabling greater collaboration.

New

Move On Up: Applying Zero Trust Design to the Office

When organizations switch offices to accommodate business needs, moving can be a major stressor for IT teams — but it doesn’t need to be.

Persistence and Patience: Qualities You Don’t Want in Ransomware Attackers

To help you stay ahead of the ever-evolving ransomware threat, I connected with Microsoft Chief Security Advisor, Sarah Armstrong-Smith.

How to Stay Current with Changing Security Landscape

I spoke with Ramy Houssaini, Chief Cyber and Technology Risk Officer at BNP Paribas, about the challenges CISOs face in an increasingly complex digital landscape.

New

Zero Trust for Texas: Lookout Receives TX-RAMP Level 2 Certification

With the TX-RAMP certification, Lookout offers a seamless path for all state entities to meet the OMB-mandated Zero Trust requirements.

Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)

The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant full command.

New

Lookout Accelerates Zero Trust Journey for Ivanti Customers With SSE

We’re offering Ivanti customers the opportunity to smoothly transition into a Zero Trust security posture without leaving behind their existing tools.

Don’t Leave it to Your Apps: Security Needs is a Shared Responsibility

Whether you’re building your footprint on-premises, on the cloud or on a hybrid architecture, security needs to be a converged effort.

New

Four Ways to Assess Your Zero Trust Security Posture

While most of us understand Zero Trust conceptually, the path to Zero Trust is complex and constantly evolving. In this blog, I break down what is and what isn’t Zero Trust.

New

Start Your Zero Trust Journey With the Gartner® SASE Roadmap

Discover why companies need to embrace zero trust and the SASE convergence with a plan. Get started today with the Gartner SASE Roadmap.

Achieving Zero Trust? One Size Does Not Fit All

We discuss the opportunities and challenges mobile and cloud technologies have created with Art Ashmann, Staff EUC Solutions Engineer at VMware.

New

Our SASE Journey: Lookout Head of IT Talks Shop

To give you insight into how Lookout implements our SASE platform and how you can get started, we sat down with our director of IT systems...

New

Lookout and U.S. Govt. on New Vision for Zero Trust

We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.

New

Zero Trust Requires Data Security | Endpoint Risk Assessment

By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.

New

Go Cloud or Go Home: The Advantage of Cloud-Delivered Cybersecurity

We discuss why on-premises solutions are no longer feasible in a remote-first environment and how Zero Trust can only be done by leveraging the power of the cloud.

New

Four Steps to Modernizing Government Cybersecurity | Zero Trust

It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.

Expanded Partnership with Google Cloud | Zero Trust Security

Today, I’m excited to announce Lookout has entered into an expanded partnership with Google Cloud to deliver endpoint-to-cloud security to organizations around the world.

New

Lookout Named Best Mobile Security Solution by the SC Awards

I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.

The Zero Trust Lesson Behind Mobile Phishing Against Australian Officials

Australia recently confirmed that a series of mobile phishing attacks were successfully executed on senior officials. Discover more at Lookout today.

New

The Future of Cloud-Delivered Security: Lookout Acquires CipherCloud

Today Lookout announced that we’ve acquired CipherCloud, a leading cloud-native security company that operates in the emerging Secure Access Service Edge (SASE) market.

New

Framing ZTNA and Security Parameters: Risks, Tenets and Best Practices

The prolific adoption of all things cloud (IaaS, PaaS, and SaaS) continues to drive massive fragmentation in security strategies and tooling used to address these challenges.

New

What SolarWinds Teaches Us About Zero Trust for Mobile Endpoints

On 12/17/2020, CISA put out an alert about an advanced persistent threat (APT) that compromised a number of U.S. government agencies, tech companies and public facilities.

Google & Lookout Partner to Deliver Zero Trust for Mobile Devices

Together, Lookout Continuous Conditional Access and Google Cloud Identity protect your Google Workspaces from malicious threats.

New

Securing the Multi-Cloud Environment through CSPM and SSPM

With the growing cloud popularity and adoption, organizations migrating their business-critical applications to the cloud are overlooking a simple cloud security question.

New

The Government IT Problem: Your Security Perimeter Has Disappeared

Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.

New

Helping Higher Education Tackle Today’s Cybersecurity Challenges

The perimeter has fully disappeared, and thankfully there are solutions that allow higher education institutions to safely and securely leverage innovation.

2018 Gartner Market Guide for Mobile Threat Defense

Gartner Market Guide for Mobile Threat Defense has a message: “Security and risk management leaders should leverage MTD to address evolving mobile security needs."

3 Ways Agencies Can Build Zero Trust In A Remote World

Discover how to make achieving zero trust a more digestible task for your government agency.

Achieving Zero Trust at State and Local Level

Learn the Top 5 Core Components of a Zero Trust Strategy in this Whitepaper

Securing Productivity from Anywhere

As we adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.

Cloud Applications: A Zero Trust Approach to Energy

Accelerated adoption of the cloud has driven energy organizations to rely more heavily on cloud-based productivity suites and apps that access data from anywhere.

Zero Trust Lab Demo

At Lookout, we deliver a fully unified data-centric cloud security platform. Learn how you can secure your data using the industry’s most advanced cloud security platform.

5 Best Practices for Achieving Zero Trust (Webinar)

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

On the Frontlines: Zero Trust Architecture in Government

Lookout was featured in the Zero Trust in Government Guide, published by Trezza Media Group in 2021 On the Frontlines Magazine. Learn more today.

A Guide for Agencies To Address Cybersecurity Exec. Order

Embark on the Zero Trust Path for Government. Lookout security experts have put together this eBook to help guide you through your Zero Trust journey.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

5 Best Practices for Achieving Zero Trust (Whitepaper)

Lookout has developed a guide that addresses unique challenges within various State and Local Government entities, and offers strategies for mitigating emerging threats.

A Zero Trust Approach to Security for Healthcare

Find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – be it SaaS, IaaS or on-premise

The Authoritative Guide to the Top CASB Use Cases

This whitepaper will share insight into the key use cases and overview the benefits that provide a strong return on investment for CASB✛ users.

How to Tackle Speed and Complexity in Security

On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations for CISOs.

Risky Business: How to Win Over Your Boards of Directors

On this week’s Security Soapbox, our host Hank Schless is joined by Paul Simmonds, CEO of the Global Identity Foundation to discuss how to cut through buzzwords.

Zero Trust Is a Shared Responsibility (Feat. Google)

On this week’s Security Soapbox, Ashish Kathapurkar and Nikhil Sinha from Google join Hank Schless to discuss the requirements of securing cloud apps and the right approach

Enabling Zero Trust for Your Mobile Devices

Find out how Zero Trust can protect your organization against a breach of your critical data.

Zero Trust: How To Assess Your Security Posture

In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to explain Zero Trust and discuss how organizations can use it

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

The “Just Because” of Zero Trust | OptivCon 2021 Interview

Lookout Chief Marketing Officer Mike Banic speaks with Senior Manager of Security Solutions Hank Schless on how Zero Trust has evolved and the current context around it.

Lookout + Microsoft Azure Sentinel – Analytics Rule

Watch how lookout uses a sample analytics rule to allow you to create threat alerts and automatically create security incidents from within Microsoft Azure Sentinel.

Achieving Zero Trust for a Mobile Workforce

On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology enable remote-work.

Lookout Continuous Conditional Access Integrates With CASB and ZTNA

Lookout CCA integrates with its CASB and ZTNA capabilities to help enable a fully effective zero trust model across all of your devices, SaaS and private apps, and users.

Lookout Continuous Conditional Access Integration With CASB & ZTNA

Lookout CCA integrates with its CASB and ZTNA capabilities to help enable a fully effective zero trust model across all of your devices, SaaS and private apps, and users.

Securing Office 365 for Financial Services Practioners

Understand how Lookout's integrated CASB and data protection approach directly addresses Office 365 email, collaboration, and infrastructure security requirements.

Cloud Enrollment and Policy Implementation

Overview of the cloud enrollment and policy implementation in the Lookout CASB Platform

Lookout + Google MDM – Full Integration Overview

Demo of how to stand up the Google + Lookout integration from both the Google and Lookout Admin dashboards, and a demo of Context Aware Access in action

Lookout + Google MDM – Lookout Enrollment

A short demo of the Lookout enrollment process for an organization that utilizes Google MDM. This demo is from the perspective of the Lookout Admin console

Lookout + Google MDM – Access Policies in Action

A short demo of the access policies in action for a mobile user trying to access Google Workspace before and after malware is detected on their device.

Lookout + Google MDM – Google Admin Setup

A short video on how to enable this integration from the Google Admin Console point of view

Modernizing Government Cybersecurity With Zero Trust

Learn about the commitment Lookout has made to keeping federal, state and local agencies secure through our platform, providing enhanced coverage from endpoint to cloud.

Lookout Mobile Endpoint Security

Security on mobile devices is often overlooked, creating a gap in your security architecture. Don't overlook the most used endpoint.

Securing Access to Your Apps With Zero Trust Approach

Your workforce is no longer bound by a traditional network perimeter. With more of your data and apps now in the cloud, your employees can stay productive from anywhere.

Create a Zero Trust Strategy for Your Mobile Workers

To fully protect your organization in this climate, you have to assume that no device is trustworthy until its risk level is verified.

The Supply Chain Reaction: Lessons from SolarWinds

In this episode, Tim LeMaster, Director of Systems Engineering at Lookout, discusses SolarWinds and how a Zero Trust security model can safeguard your infrastructure.

Lookout and VMware: Continuous Conditional Access

Seamless and secure access to data regardless of where you store your data.

Securely Enable Your Employees

Learn how Continuous Conditional Access can secure your organization regardless of where your employees choose to work.

How Lookout Enforces Zero Trust

We implement Zero Trust for your smartphones and tablets by continuously assessing their health.

Lookout CCA + GSuite Continuous Conditional Access

Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks.

Lookout + VMware Workspace One Intelligence

Organizations are increasingly adopting formal mobility programs to empower mobile productivity.Here's why you need a unified endpoint to cloud solution to protect data.

Lookout + VMware Workspace ONE UEM

As corporate data goes mobile, integrating a unified endpoint management solution with a cloud-based, mobile threat detection solution provides the best protection.

How To Secure Your Post-Perimeter World

As employees continue to use a mix of managed and unmanaged devices to access corporate resources, the need for a new security architecture arises.

Lookout for Federal Agencies

Get the latest guidelines related to securing mobility and how Lookout helps Federal agencies stay compliant with these new guidelines.