The world has changed. Today people work from anywhere, accessing corporate data from devices that can’t always be trusted. At the same time, the expectation of user privacy has soared, making it even harder to protect devices from bad actors - who are increasingly targeting users no longer protected by traditional perimeter-based security. That’s why critical security services must move to the endpoint, and access to data must be based on a continuous assessment of trust, from an assumption of zero trust.
To create trust for devices in a zero trust world, Lookout Continuous Conditional Access works behind the scenes, dynamically monitoring the health of the endpoint while the user is connected to the enterprise. Only trusted devices are allowed to connect to enterprise infrastructure and data, for both managed and unmanaged deployments. This continuous assessment of risk begins at the start of a session and the entire time a user is accessing corporate data.
In a post-perimeter world, critical functions must move to the endpoint as they connect to the enterprise outside the reach of traditional perimeter security. A key function subject to this move is phishing and content protection. Lookout Phishing AI crawls the internet looking for the creation of new phishing sites. Based on proactively determined reputation for sites using an AI detection engine, Lookout inspects URLs from any app on the device and dynamically blocks requests to sites identified as malicious.