www.lookout.com
Open in
urlscan Pro
184.24.12.246
Public Scan
Submitted URL: https://ams.lookout.com/t/10371/c/816beeaf-4db8-4e58-9e40-7e85e99e874a/NB2HI4B2F4XXO53XFZWG633LN52XILTDN5WQ====/www-look...
Effective URL: https://www.lookout.com/
Submission: On October 01 via manual from CA — Scanned from DE
Effective URL: https://www.lookout.com/
Submission: On October 01 via manual from CA — Scanned from DE
Form analysis
1 forms found in the DOM/search
<form action="/search" class="search-form w-form" __bizdiag="107944136" __biza="WJ__"><input type="search" class="search-input w-input" maxlength="256" name="query" placeholder="Search…" id="search" required=""><input type="submit" value="S"
class="search-button w-button"></form>
Text Content
Consumer LOOKOUT CONSUMER Get Protection Now Login to Existing Account Access your personal account Contact Support Get help for your Lookout app Enterprise LOOKOUT ENTERPRISE Secure Your Enterprise BY PRODUCT Secure Access Service Edge Mobile Endpoint Security Zero Trust Network Access Cloud Access Security Broker Threat Intelligence BY USE CASE Bring Your Own Device Phishing Ransomware Remote Work Zero Trust BY INDUSTRY Federal Government Financial Services Healthcare Legal Manufacturing Pharmaceutical State and Local Government GET LOOKOUT FOR Enterprise Small Business Developers Researchers Partners LOOKOUT PARTNERS Partner With Us Technology Become a technology partner Carrier Become a carrier partner Channel Become a channel partner Google Unifying security with Google Microsoft Unifying security with Microsoft VMware Partnering to protect telemetry data Resources RESOURCES Analyst Reports What analysts say about us Blog Read our latest blogs Case Studies Read case studies from clients Content Library Access videos, infographics and more Threat Lab Get updated on the latest threats EVENTS On-Demand Webinars Watch our latest recorded webinars Podcasts Listen to the Endpoint Enigma podcast Upcoming Events Sign up to attend upcoming events Virtual Summit 2020 Watch highlights from our latest summit DISCOVERY App Threats Map Identify app threats near me Mobile Phishing Map Identify mobile threats near me Compliance Corner Learn compliance practices Post Perimeter Security Alliance The future security alliances Company ABOUT US Learn About Lookout Partners Partner with us today Careers Discover your next career Foundation Changing lives for the better Leadership Learn about our leadership Life at Lookout What drives us at Lookout Newsroom Check out the latest news Login PersonalEnterprisePartners Contact Sales WORK ANYWHERE WITH ENDPOINT-TO-CLOUD SECURITY Collaboration is skyrocketing as data goes wherever it’s needed. To secure data while respecting user privacy, you need an integrated endpoint-SASE solution. Learn More KNOW WHAT'S GOING ON LIKE YOU STILL HAVE A PERIMETER With data and users everywhere, it’s hard to see what you’re up against. Eliminate the guesswork by continuously assessing security, from endpoint to cloud. Learn More MAKE SENSE OF THREAT DATA WITH UNIFIED INSIGHTS Standalone tools make cybersecurity unnecessarily complex. We give you actionable insight in one place to implement precise policies and hunt for threats. Learn More ACCESS WHAT YOU NEED WITHOUT RISKING WHAT YOU VALUE Cloud access doesn’t have to be all or nothing. Knowing the data and apps your employees need, we dynamically provide only the trusted access required. Learn More Slide 2 of 4. LOOKOUT ACQUIRES CIPHERCLOUD TO DELIVER INTEGRATED ENDPOINT TO CLOUD SECURITY Read the CEO's Blog RECENT ZERO TRUST WEBCAST - “ZERO TRUST: SECURITY FROM DEVICE TO CLOUD” Watch The Video PROTECT YOURSELF FROM POWERFUL PEGASUS SPYWARE Read The Blog WHY INTEGRATING ENDPOINT SECURITY AND SASE IS ESSENTIAL Collaboration is skyrocketing as data goes wherever it’s needed. To securely tap into this productivity you need secure access service edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely, especially on their personal devices. Lookout integrates endpoint security with SASE so you can secure data while respecting user privacy. Learn About MESLearn About CASBLearn About ZTNA VISIBILITY LIKE YOU STILL HAVE A PERIMETER It’s hard to see what you’re up against when your users are everywhere, using networks you don’t control to access your data in the cloud. We eliminate the guesswork by providing visibility into what’s happening at all times – on unmanaged endpoints, in the cloud and everywhere in between. Get More Visibility UNIFIED INSIGHTS TO MAKE SENSE OF EVERYTHING Standalone tools make cybersecurity unnecessarily complex, unintentionally creating security gaps and human error. We give you actionable insights within a single platform so you can implement precise policies, hunt for threats and conduct forensic investigations. Read SASE Brochure SEAMLESS ACCESS WITH PRECISE CONTROLS Cloud access doesn’t have to be all or nothing. Security shouldn’t interrupt productivity or impair the user’s experience. With visibility and insights into everything, we enable you to secure your data by dialing in precise access and providing a seamless and efficient experience. Get CASB Datasheet Explore Endpoint to Cloud Security ENDPOINT-TO-CLOUD SECURITY MOBILE ENDPOINT SECURITY iOS, Android and Chrome OS devices have as much access as other endpoints. Without invading privacy, we can detect and respond to known and unknown threats. Close Your Mobile Gap ZERO TRUST NETWORK ACCESS Unlimited access isn’t the only way to provide remote access. Knowing what’s needed, we dynamically provide them with only the access you need. Replace Your VPN With ZTNA CLOUD ACCESS SECURITY BROKER Don’t give up control just because you now use cloud apps. We give you granular control as if these apps are running inside your data center. Stay In Control With CASB WHAT ANALYSTS SAY ABOUT LOOKOUT "Mobile Threat Defense is emerging as a component that enables implementation of ZTNA for iOS and Android devices. MTD can provide an assessment of a device to a ZTNA trust broker, which can decide whether to allow access to a specific enterprise application." Gartner Market Guide: MTD 2021, Dioniso Zumerle, Rob Smith Read Report “The interface is uncluttered, and the workflow for creating new policies is easy to understand and manage. Administrators can get up to speed and create effective policies quickly.” Gartner Magic Quadrant: CASB 2020, Craig Lawson, Steve Riley Read Report “Lookout has a strong console and administrative functionality, where it can display risky behavior of devices and apps across an entire network of devices.” IDC MarketScape: MTM 2020, Phil Hochmuth Read Report "[Lookout CASB] provides differentiated capabilities such as native Rights Management, Zero Trust Network Access (ZTNA), Email protection, and end-to-end data protection with common enterprise SaaS, PaaS, and IaaS applications." KuppingerCole Market Compass: CASB 2021, Mike Small Read Report View All Analyst Reports LOOKOUT CASB+ June 29, 2021 REVIEWER ROLE Security and Risk Management COMPANY SIZE <5,000 Employees "EASE OF USE, VERY FUNCTIONAL REPORTING." "From onboarding CASB+ we have experienced nothing but professionalism from Lookout. They are a great company to work with. We have met with the team every week and discussed the project. They provide us with great results each time." Read Full Review LOOKOUT MOBILE ENDPOINT SECURITY June 25, 2021 REVIEWER ROLE Program and Portfolio Management COMPANY SIZE Gov't/PS/ED 5,000 - 50,000 Employees "LOOKOUT DEPLOYMENT: AN OUTSTANDING COLLABORATIVE EXPERIENCE" "I am a project manager and worked with the Lookout team to deploy their agent to our mobile endpoints of over 5,000 users. Their team were consummate professionals and made the experience one of the most collaborative and transparent that I've ever experienced in my career. Read Full Review LOOKOUT MOBILE ENDPOINT SECURITY June 17, 2021 REVIEWER ROLE CEO COMPANY SIZE <50M USD "LOOKOUT PROVIDES EXCELLENT MOBILE SECURITY" "We have used multiple mobile device security apps over the years, and always found issues with them either not providing multiple layers of protection, or their apps would randomly stop running. Lookout covers many threat vectors that could allow bad actors to gain access to a mobile device, and it stays running on the mobile devices." Read Full Review Write A ReviewRead All CASB ReviewsRead All MTD Reviews HOW WE HELP OUR CUSTOMERS SCHNEIDER ELECTRIC RAPIDLY DEPLOYS SECURITY TO GLOBAL FLEET Schneider Electric is one of the global leaders in energy management and automation solutions... Read Case Study FEDERAL SYSTEMS INTEGRATOR SECURES AGAINST MOBILE PHISHING “Lookout enables people to work the way they want on their phones,” says security... Read Case Study TOP US NATIONAL BANK DEPLOYS LOOKOUT CLOUD KEY SECURITY Learn how a leading financial organization uses Lookout secure cloud infrastructure to stay ahead... Read Case Study LOOKOUT DELIVERS ENDPOINT-TO-CLOUD SECURITY REQUEST A DEMO CONTACT SALES FREE TRIAL Contact Lookout Contact Support Contact Enterprise Sales Worldwide Office Locations Get Lookout for Consumers Enterprise Small Businesses Developers Researchers Resources Analyst Reports Blogs Threat Lab Podcasts On-Demand Webinars Upcoming Events Products Secure Access Service Edge Mobile Endpoint Security Zero Trust Network Access Cloud Access Security Broker Threat Intelligence Select Language EnglishJapaneseGermanFrenchItalian Legal | Privacy Policy | Cookie Policy | Transparency Report | Do not sell my personal information (California residents) © 2021 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, SCREAM®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. EVERYTHING IS OK®, LOOKOUT MOBILE SECURITY®, POWERED BY LOOKOUT®, and PROTECTED BY LOOKOUT®, are registered trademarks of Lookout, Inc. in the United States; and POST PERIMETER SECURITY ALLIANCE are trademarks of Lookout, Inc. Android is a trademark of Google Inc. Apple, the Apple logo, and iPhone are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Back Button Performance Cookies Vendor Search Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Privacy Notice Accept All Cookies Cookies Settings