Lookout Reimagined: The Freedom of Control

A company's brand is a signal to the world about their vision and commitment, and we are excited that Lookout is debuting a reimagined identity and position center.


Avoid a Meltdown by Modernizing IT Security

Organizations hold onto their outdated systems because they don’t see the sense in changing something that is working, but it only takes one change to cause a major meltdown.

A Security Work Stream Is Critical to IT Modernization

IT cloud modernization is a great way to drive sales growth, have the edge over your competitors, and boost your employees’ productivity while enabling greater collaboration.

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

We're excited to announce the integration of Titus and Boldon James, leading data classification systems from Fortra, with the Lookout security service edge (SSE) solution.

Lookout and HPE Aruba Announce Integrated SASE Architecture

With this partnership, customers can leverage two best-of-breed solutions to create an integrated, modern SASE architecture.

From Access-centric Security to Data-centric Security

With millions of cloud apps, why would we want to use the same access-centric security approach for today's infrastructure that we used in the nineties?

Five Steps Towards Building a Better Data Security Strategy

A unified edge security platform can give you the visibility and control you need to create a modern and efficient architecture for protecting users, applications and data.


Four Questions to Ask About Your Cloud Security Posture

As your organization transforms its digital infrastructure, cybersecurity needs to go through the same transformation.


Social Engineering and VPN Access: The Making of a Modern Breach

It’s tough to find the silver lining in a security incident, but we can always do our best to learn from each one. Let’s take a look at what we can glean from the Uber breach.


Flexible, Edge-Directed Meshes: Why SASE is the Future of Cybersecurity

A wrenching transference from on-premises to cloud-centric data security systems is gaining steam. Security teams are engaged in pushing cybersecurity out to the far edges.


Symmetric vs. Asymmetric Encryption – Which is Best?

One of the basic questions in considering encryption is to understand the differences between symmetric and asymmetric encryption methods, and where to apply each method.

How to Mitigate Risks When Your Data is Scattered Across Clouds

As you transition to the cloud, it’s critical to have a security solution equipped to handle the risks. A unified cloud-delivered security platform is the best solution.

Move On Up: Applying Zero Trust Design to the Office

When organizations switch offices to accommodate business needs, moving can be a major stressor for IT teams — but it doesn’t need to be.


Lookout Expands Partnership to Deliver SSE to Verizon Business Customers

Verizon has launched the Lookout suite of cloud security solutions to deliver security service edge (SSE) and ensure that customers can seamlessly secure their data and apps.

Work and Life Have Intertwined: Why You Need to Protect Against Phishing

Don't bring your personal life into the office; don't bring your work stuff home — these were already difficult tasks prior to the 2020 pandemic.

Privacy, SSE Adoption: My Takeaways From the 2022 Gartner SRM in London

I had the privilege of attending a number of sessions, spending time talking with analysts and digesting some of the latest cybersecurity trends and strategies.

My Journey Beyond the Perimeter: Why Firewalls Alone Can’t Protect Data

While firewalls are necessary, they aren’t sufficient. We need to evolve our security thinking from a perimeter, access control-centric view to a distributed data-centric one.

Fortify Your SD-WAN With SSE Integration

As organizations begin to combine legacy on-premises tools with cloud services, integrating SSE with existing SD-WAN will help address new cloud-based security challenges.


Vodafone Bundles Lookout with Google Workspace to Protect Small Businesses

Even before working from anywhere became the norm, organizations of every size were already becoming more reliant on mobile devices and productivity apps.

Higher Ed: Protecting Sensitive Data Requires a Unified Approach

Demands to protect systems and data are rising, as higher education institutions are now subject to more stringent cybersecurity and privacy expectations.

How to Stay Current with Changing Security Landscape

I spoke with Ramy Houssaini, Chief Cyber and Technology Risk Officer at BNP Paribas, about the challenges CISOs face in an increasingly complex digital landscape.

Protecting Data in Healthcare Systems Requires a Unified Approach

To ensure that they are protected against intrusion, compromise, disruption and data exfiltration, hospital systems need to rethink the way they deploy cybersecurity.


Securing Cloud Usage When Shadow IT is the Norm

By harnessing the many powers of converged security, SSE diminishes the worries of the unknown – regaining visibility and control with granular policies.

Lookout Accelerates Zero Trust Journey for Ivanti Customers With SSE

We’re offering Ivanti customers the opportunity to smoothly transition into a Zero Trust security posture without leaving behind their existing tools.


How to Protect Your Data When Ransomware Strikes

A ransomware attack isn’t a single event; it’s persistent. To secure your organization, you need a full picture of what is happening with your endpoints, users, apps and data.


Data is Everywhere and Encryption Must Follow: Why You Need EDRM

Enforcing data access policies has become increasingly complicated. EDRM ensures that data boundaries are set dynamically, even when the data travels around freely.


Attention CISOs: the Board Doesn’t Care About Buzzwords

We live in an IT world surrounded by buzzwords that are largely marketing gimmicks. Zero Trust, for example, is a concept no one understands and is slapped onto everything.

Cyber Readiness and the Russia-Ukraine War

The cyber threats initially directed at Ukrainian government bodies and infrastructure could easily be targeted at other nations.

Security Service Edge (SSE) Is the Way To Go, but How Do You Choose?

Organizations need to streamline their security operations — that’s where SSE comes in. But not all products are made equal.

Lookout Obtains FedRAMP JAB P-ATO for SASE: What It Means for You

As the federal government continues to emphasize the importance of Zero Trust, Lookout has achieved a major milestone to aid in those efforts.

Lookout Named a Visionary in 2022 Gartner® Magic Quadrant™ for SSE

We believe our strong position in the “Completeness of Vision” axis demonstrates the alignment of the Lookout Platform with the market direction.

How to Protect Yourself from Supply Chain Attacks

To better understand these attacks, I invited Vodafone security experts Andy Deacon and Verity Carter-Johnson to the Lookout podcast.

How to Reduce Risk and Secure Data With Security Service Edge (SSE)

There’s a new acronym in town: SSE, which stands for Security Service Edge. If this looks similar to Secure Access Service Edge (SASE), it’s because they are closely related.


Critical Capabilities of a Modern DLP

We discuss how modern DLP solutions, integrated in a cloud-delivered platform, can help organizations prevent data breaches while providing secure access to remote workers.

Four Ways to Assess Your Zero Trust Security Posture

While most of us understand Zero Trust conceptually, the path to Zero Trust is complex and constantly evolving. In this blog, I break down what is and what isn’t Zero Trust.


How to Keep Your Data Secure in Light of Apache Log4j Vulnerabilities

In quick succession in December, The Apache Software Foundation released information on two critical vulnerabilities in its Log4j Java-based library.

Start Your Zero Trust Journey With the Gartner® SASE Roadmap

Discover why companies need to embrace zero trust and the SASE convergence with a plan. Get started today with the Gartner SASE Roadmap.

Predictions 2022: Work-From-Anywhere Brings End of On-Premise Security

I believe that in 2022 we will see the beginning of the end of on-premises security tools, as isolated, point solutions running in data centers.

Our SASE Journey: Lookout Head of IT Talks Shop

To give you insight into how Lookout implements our SASE platform and how you can get started, we sat down with our director of IT systems...

Zero Trust Requires Data Security | Endpoint Risk Assessment

By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.

Go Cloud or Go Home: The Advantage of Cloud-Delivered Cybersecurity

We discuss why on-premises solutions are no longer feasible in a remote-first environment and how Zero Trust can only be done by leveraging the power of the cloud.

Code Blue: Healthcare Security in the Age of 5G and Remote Work

Why were hospitals so frequently breached by attacks? To answer that question, I turned to an old friend of Lookout — former CISO Mike Murray.

Malware as a Service Meets Mobile Phishing: A Dangerous Combo

This campaign is the latest example of how attacks are leveraging various mobile-targeting methods to maximize their return.

The Future of Cloud-Delivered Security: Lookout Acquires CipherCloud

Today Lookout announced that we’ve acquired CipherCloud, a leading cloud-native security company that operates in the emerging Secure Access Service Edge (SASE) market.

On-Prem or Cloud? Lessons from the Microsoft Exchange Attack

Organizations utilize on-premise software because they want full control. But it actually increases their risks.

The Tradition of Giving at Lookout

Our mission at the Lookout Foundation is to make meaningful differences around us – in the neighborhoods we live and in the industry we work.

Securing Collaboration in the Wake of the Cloud

Rachel Wilson, Head of Data Security at Morgan Stanley Wealth Management discusses how to protect enterprise data when collaborating in the cloud.

3 Ways Agencies Can Build Zero Trust In A Remote World

Discover how to make achieving zero trust a more digestible task for your government agency.

Modern Cybersecurity Solutions Must Include Data Protection

Enterprise Strategy Group's Jon Oltsik discusses the security landscape of today and why organizations need a data-centric cloud security.

Security Service Edge: How to Detect & Mitigate Cyber Threats

The third episode in a webinar series on Security Service Edge (SSE), discussing how to detect and mitigate cyber threats.

How to Build an Effective Data Security Strategy

Learn the key requirements you need to build an effective data security strategy.

Google + Lookout | Data Security For Your Cloud

Watch this webinar and hear case studies that exhibit how Lookout and Google partner to protect customers.

​​The Freedom Of Control: Enable Your Business While Minimizing Risk

Control. For decades, it’s been the mandate for Enterprise IT teams. Put it behind firewalls. Don’t let it slip onto personal devices. But everything has changed.

Building A Data-Centric Security Strategy for Your Business

Users and the applications they depend on are more widely distributed than ever, and threats continue to evolve. But “lock it down” no longer works for your business.

Gartner® Predicts 2022: Consolidated Security Platforms

This Gartner report shows how an integrated cloud security platform approach can help you protect your sensitive data, while gaining operational efficiencies and efficacy.

Securing Productivity from Anywhere

As we adapt to permanent hybrid working there is a need to keep employees productive on any device while they work with corporate data across multiple sources.

Cloud Applications: A Zero Trust Approach to Energy

Accelerated adoption of the cloud has driven energy organizations to rely more heavily on cloud-based productivity suites and apps that access data from anywhere.

Zero Trust Lab Demo

At Lookout, we deliver a fully unified data-centric cloud security platform. Learn how you can secure your data using the industry’s most advanced cloud security platform.

How to Build an Effective Data Security Strategy

Five steps towards full visibility and control across your organization.

How to Tackle Speed and Complexity in Security

On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations for CISOs.

Risky Business: How to Win Over Your Boards of Directors

On this week’s Security Soapbox, our host Hank Schless is joined by Paul Simmonds, CEO of the Global Identity Foundation to discuss how to cut through buzzwords.

Zero Trust Is a Shared Responsibility (Feat. Google)

On this week’s Security Soapbox, Ashish Kathapurkar and Nikhil Sinha from Google join Hank Schless to discuss the requirements of securing cloud apps and the right approach

Zero Trust: How To Assess Your Security Posture

In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to explain Zero Trust and discuss how organizations can use it

Is 2022 the Beginning of the End of On-Prem Security?

Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Enabling the U.S. Government To Achieve Zero Trust

In today’s environment, security teams cannot trust users that attempt to connect to their network, applications and data, even after they have authenticated.

Lookout Fortune Article

Secure access service edge (SASE) solutions provide a competitive edge by optimizing network protection and performance.

Achieving Zero Trust for a Mobile Workforce

On this week’s Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology enable remote-work.

Lookout Continuous Conditional Access Integrates With CASB and ZTNA

Lookout CCA integrates with its CASB and ZTNA capabilities to help enable a fully effective zero trust model across all of your devices, SaaS and private apps, and users.

Lookout Continuous Conditional Access Integration With CASB & ZTNA

Lookout CCA integrates with its CASB and ZTNA capabilities to help enable a fully effective zero trust model across all of your devices, SaaS and private apps, and users.

Lookout Cloud Security Bundles

Lookout Cloud Security’s integrated endpoint-to-cloud platform provides visibility and realtime data and threat protection when accessing cloud services from anywhere.

Integrating Security From Endpoint-to-Cloud

With data going wherever it’s needed, organizations require security that provides the visibility and control once existed inside the perimeter.

Lookout SASE Solution (SASE)

With digital collaboration skyrocketing, data now goes wherever it’s needed. To tap into this boosted productivity without risking your data, you must secure every endpoint.

Post-Perimeter Security for Government

See surprising mobile device trends among federal employees and learn how to implement post-perimeter security at your organization.

How To Secure Your Post-Perimeter World

As employees continue to use a mix of managed and unmanaged devices to access corporate resources, the need for a new security architecture arises.