A New Approach to Data Security for the New Year

Going into 2023, your organization should be laser-focused on identity and data, and the technologies that secure these elements will have to evolve.

A Security Work Stream Is Critical to IT Modernization

IT cloud modernization is a great way to drive sales growth, have the edge over your competitors, and boost your employees’ productivity while enabling greater collaboration.

Move On Up: Applying Zero Trust Design to the Office

When organizations switch offices to accommodate business needs, moving can be a major stressor for IT teams — but it doesn’t need to be.

Persistence and Patience: Bad Qualities for Ransomware Attackers

To help you stay ahead of the ever-evolving ransomware threat, I connected with Microsoft Chief Security Advisor, Sarah Armstrong-Smith.

How to Stay Current with Changing Security Landscape

I spoke with Ramy Houssaini, Chief Cyber and Technology Risk Officer at BNP Paribas, about the challenges CISOs face in an increasingly complex digital landscape.

Zero Trust Texas: Lookout Receives TX-RAMP Level 2 Certification

With the TX-RAMP certification, Lookout offers a seamless path for all state entities to meet the OMB-mandated Zero Trust requirements.

3 Lessons from Confluence Server Vulnerability (CVE-2022-26134)

The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant full command.

Lookout Accelerates Ivanti Customers' Zero Trust Journey With SSE

We’re offering Ivanti customers the opportunity to smoothly transition into a Zero Trust security posture without leaving behind their existing tools.

Don’t Leave it to Apps: Security Needs is a Shared Responsibility

Whether you’re building your footprint on-premises, on the cloud or on a hybrid architecture, security needs to be a converged effort.

Four Ways to Assess Your Zero Trust Security Posture

While most of us understand Zero Trust conceptually, the path to Zero Trust is complex and constantly evolving. In this blog, I break down what is and what isn’t Zero Trust.

Start Your Zero Trust Journey With the Gartner® SASE Roadmap

Discover why companies need to embrace zero trust and the SASE convergence with a plan. Get started today with the Gartner SASE Roadmap.

Achieving Zero Trust? One Size Does Not Fit All

We discuss the opportunities and challenges mobile and cloud technologies have created with Art Ashmann, Staff EUC Solutions Engineer at VMware.

Our SASE Journey: Lookout Head of IT Talks Shop

To give you insight into how Lookout implements our SASE platform and how you can get started, we sat down with our director of IT systems...

Lookout and U.S. Govt. on New Vision for Zero Trust

We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.

Zero Trust Requires Continuous Data and Endpoint Telemetry

By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.

Go Cloud or Go Home: Advantage of Cloud-Delivered Cybersecurity

We discuss why on-premises solutions are no longer feasible in a remote-first environment and how Zero Trust can only be done by leveraging the power of the cloud.

Four Steps to Modernizing Government Cybersecurity | Zero Trust

It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.

Expanded Partnership with Google Cloud | Zero Trust Security

Today, I’m excited to announce Lookout has entered into an expanded partnership with Google Cloud to deliver endpoint-to-cloud security to organizations around the world.

Lookout Named Best Mobile Security Solution by the SC Awards

I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.

Zero Trust Lesson From Mobile Phishing Against Australian Govt.

Australia recently confirmed that a series of mobile phishing attacks were successfully executed on senior officials. Discover more at Lookout today.

Future of Cloud-Delivered Security: Lookout Acquires CipherCloud

Today Lookout announced that we’ve acquired CipherCloud, a leading cloud-native security company that operates in the emerging Secure Access Service Edge (SASE) market.

Framing ZTNA & Security Parameters: Risks Tenets & Best Practices

The prolific adoption of all things cloud (IaaS, PaaS, and SaaS) continues to drive massive fragmentation in security strategies and tooling used to address these challenges.

What SolarWinds Teaches Us About Zero Trust for Mobile Endpoints

On 12/17/2020, CISA put out an alert about an advanced persistent threat (APT) that compromised a number of U.S. government agencies, tech companies and public facilities.

Google & Lookout Partner to Deliver Zero Trust for Mobile Devices

Together, Lookout Continuous Conditional Access and Google Cloud Identity protect your Google Workspaces from malicious threats.

Securing the Multi-Cloud Environment through CSPM and SSPM

With the growing cloud popularity and adoption, organizations migrating their business-critical applications to the cloud are overlooking a simple cloud security question.

The Government IT Problem: The Security Perimeter Has Disappeared

Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.

Helping Higher Education Tackle Today’s Cybersecurity Challenges

The perimeter has fully disappeared, and thankfully there are solutions that allow higher education institutions to safely and securely leverage innovation.

2018 Gartner Market Guide for Mobile Threat Defense

Gartner Market Guide for Mobile Threat Defense has a message: “Security and risk management leaders should leverage MTD to address evolving mobile security needs."

3 Ways Agencies Can Build Zero Trust In A Remote World

Discover how to make achieving zero trust a more digestible task for your government agency.

Achieving Zero Trust at State and Local Level

Learn the Top 5 Core Components of a Zero Trust Strategy in this Whitepaper

On the Frontlines: Zero Trust Architecture in Government

Lookout was featured in the Zero Trust in Government Guide, published by Trezza Media Group in 2021 On the Frontlines Magazine. Learn more today.

A Guide for Agencies To Address Cybersecurity Exec. Order

Embark on the Zero Trust Path for Government. Lookout security experts have put together this eBook to help guide you through your Zero Trust journey.

5 Best Practices for Achieving Zero Trust (Whitepaper)

Lookout has developed a guide that addresses unique challenges within various State and Local Government entities, and offers strategies for mitigating emerging threats.

Putting the “Trust” in Zero Trust

There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared.

ESG eBook: 2021 SASE Trends

In order to gain insight into these cloud security trends, ESG surveyed 613 cybersecurity, networking, and IT professionals and shares their findings in this eBook.

The Top 5 Disadvantages of VPN

Many organizations rely on Virtual Private Networks (VPNs), but this can allow unknown endpoints and networks to access your entire infrastructure, but ZTNA fixes that.

Putting the “Trust” in Zero Trust: Post-Perimeter Security for Government

As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Zero Trust for mobile. Learn more in this whitepaper.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Securing Access to Your Apps With Zero Trust Approach

Your workforce is no longer bound by a traditional network perimeter. With more of your data and apps now in the cloud, your employees can stay productive from anywhere.

Lookout and VMware: Continuous Conditional Access

Seamless and secure access to data regardless of where you store your data.

Securely Enable Your Employees

Learn how Continuous Conditional Access can secure your organization regardless of where your employees choose to work.

How Lookout Enforces Zero Trust

We implement Zero Trust for your smartphones and tablets by continuously assessing their health.

Lookout + VMware Workspace One Intelligence

Organizations are increasingly adopting formal mobility programs to empower mobile productivity.Here's why you need a unified endpoint to cloud solution to protect data.

Lookout CCA + GSuite Continuous Conditional Access

Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks.

Lookout + VMware Workspace ONE UEM

As corporate data goes mobile, integrating a unified endpoint management solution with a cloud-based, mobile threat detection solution provides the best protection.

How To Secure Your Post-Perimeter World

As employees continue to use a mix of managed and unmanaged devices to access corporate resources, the need for a new security architecture arises.

Lookout for Federal Agencies

Get the latest guidelines related to securing mobility and how Lookout helps Federal agencies stay compliant with these new guidelines.