The Lookout Security Cloud leverages a data-driven approach to detect complex patterns that indicate known and novel threats, software vulnerabilities, and risky mobile behaviors and configurations. Find out how your organization can best leverage Lookout’s platform by exploring our products below.
The success of Lookout’s personal and enterprise endpoint products has given Lookout visibility into over 100M mobile devices worldwide. Every month millions of devices in over 150 countries send security telemetry to the Lookout Security Cloud, ensuring that Lookout can track evolving threat actors and continue to lead the industry in novel threat discoveries such as the Pegasus spyware.
Lookout’s unmatched mobile dataset gives us the advantage of security precision and context: it allows us to understand if a potential mobile threat signal or characteristic is normal, rare, or truly anomalous in the world. We’ve acquired and analyzed over 40M unique mobile applications, for example, and track their prevalence in real-time across our global sensor network.
One platform, the Lookout Security Cloud, powers a wide range of solutions across Lookout’s portfolio of products and services. Lookout’s platform offers the industry’s deepest and most comprehensive set of mobile security capabilities spanning mobile threat defense (MTD), mobile app reputation service (MARS), mobile threat intelligence and beyond. An innovation leader, Lookout has over 110 granted patents related to mobile security technology.
To create a more secure and robust approach to protecting mobile endpoints, we specifically designed our platform to prioritize cloud-side analysis over our on-device analysis techniques, whenever possible. On-device analysis techniques are inherently less secure because attackers can inspect and evade them, and they can also negatively impact device performance and battery life if over-prioritized.
The need for organizations to have mobile threat defense in place has never been more clear given the sophisticated string of attacks seen recently on both Android and iOS devices, perpetrated both by private organizations and nation states.
Software vulnerabilities can exist across all layers of the mobile environment and they raise the risk that critical mobile software and hardware can be exploited by attackers to steal data and attack organizations.
Outside of mobile threats and software vulnerabilities, a wide range of mobile environment configurations and behaviors, such as app data leakage, can nonetheless elevate an organization’s risk profile.
“Lookout combines machine learning and contextual analytics to protect mobile devices from malicious applications.”
Cybersecurity Startup Reviews ‘App’s DNA’ to Help CIOs Identify Mobile Malware, November 2014
Wall Street Journal