The Lookout Security Cloud leverages a data-driven approach to detect complex patterns that indicate known and novel threats, software vulnerabilities, and risky mobile behaviors and configurations. Find out how your organization can best leverage Lookout’s platform by exploring our products below.
The success of Lookout’s personal and enterprise endpoint products has given Lookout visibility into over 150M mobile devices worldwide. Every month millions of devices in over 150 countries send security telemetry to the Lookout Security Cloud, ensuring that Lookout can track evolving threat actors and continue to lead the industry in novel threat discoveries such as the Pegasus spyware.
Lookout’s unmatched mobile dataset gives us the advantage of security precision and context: it allows us to understand if a potential mobile threat signal or characteristic is normal, rare, or truly anomalous in the world. We’ve acquired and analyzed over 50M unique mobile applications, for example, and track their prevalence in real-time across our global sensor network.
One platform, the Lookout Security Cloud, powers a wide range of solutions across Lookout’s portfolio of products and services. Lookout’s platform offers the industry’s deepest and most comprehensive set of mobile security capabilities spanning mobile threat defense (MTD), mobile app reputation service (MARS), mobile threat intelligence and beyond. An innovation leader, Lookout has over 110 granted patents related to mobile security technology.
To create a more secure and robust approach to protecting mobile endpoints, we specifically designed our platform to prioritize cloud-side analysis over our on-device analysis techniques, whenever possible. On-device analysis techniques are inherently less secure because attackers can inspect and evade them, and they can also negatively impact device performance and battery life if over-prioritized.
The need for organizations to have mobile threat defense in place has never been more clear given the sophisticated string of attacks seen recently on both Android and iOS devices, perpetrated both by private organizations and nation states.
Software vulnerabilities can exist across all layers of the mobile environment and they raise the risk that critical mobile software and hardware can be exploited by attackers to steal data and attack organizations.
Outside of mobile threats and software vulnerabilities, a wide range of mobile environment configurations and behaviors, such as app data leakage, can nonetheless elevate an organization’s risk profile.
“Lookout is positioned as a Leader in this IDC MarketScape for the MTM security software market.*”
IDC MarketScape: Worldwide Mobile Threat Management Security Software 2017
*IDC MarketScape: Worldwide Mobile Threat Management Security Software 2017 Vendor Assessment, Doc # US42373417, September 2017.
Complete this online mobile risk assessment to get insight into your current level of mobile risk based on your mobility policies and existing controls such as EMM. This assessment is based on a framework called the Mobile Risk Matrix, outlining risk across threats, software vulnerabilities, and risky behaviors & configurations for each of the attack vectors on mobile devices.
Get a custom assessment of GDPR and business risks to personal data by answering 20 questions about the state of mobility in your organization.