www.lookout.com Open in urlscan Pro
184.24.12.246  Public Scan

Submitted URL: https://ams.lookout.com/t/10371/c/816beeaf-4db8-4e58-9e40-7e85e99e874a/NB2HI4B2F4XXO53XFZWG633LN52XILTDN5WQ====/www-look...
Effective URL: https://www.lookout.com/
Submission: On October 01 via manual from CA — Scanned from DE

Form analysis 1 forms found in the DOM

/search

<form action="/search" class="search-form w-form" __bizdiag="107944136" __biza="WJ__"><input type="search" class="search-input w-input" maxlength="256" name="query" placeholder="Search…" id="search" required=""><input type="submit" value="S"
    class="search-button w-button"></form>

Text Content

Consumer

LOOKOUT CONSUMER

Get Protection Now


Login to Existing Account
Access your personal account
Contact Support
Get help for your Lookout app
Enterprise

LOOKOUT ENTERPRISE

Secure Your Enterprise



BY PRODUCT

Secure Access Service Edge
Mobile Endpoint Security
Zero Trust Network Access
Cloud Access Security Broker
Threat Intelligence

BY USE CASE

Bring Your Own Device
Phishing
Ransomware
Remote Work
Zero Trust

BY INDUSTRY

Federal Government
Financial Services
Healthcare
Legal
Manufacturing
Pharmaceutical
State and Local Government

GET LOOKOUT FOR

Enterprise
Small Business
Developers
Researchers
Partners

LOOKOUT PARTNERS

Partner With Us


Technology
Become a technology partner
Carrier
Become a carrier partner
Channel
Become a channel partner
Google
Unifying security with Google
Microsoft
Unifying security with Microsoft
VMware
Partnering to protect telemetry data
Resources

RESOURCES

Analyst Reports
What analysts say about us
Blog
Read our latest blogs
Case Studies
Read case studies from clients
Content Library
Access videos, infographics and more
Threat Lab
Get updated on the latest threats

EVENTS

On-Demand Webinars
Watch our latest recorded webinars
Podcasts
Listen to the Endpoint Enigma podcast
Upcoming Events
Sign up to attend upcoming events
Virtual Summit 2020
Watch highlights from our latest summit

DISCOVERY

App Threats Map
Identify app threats near me
Mobile Phishing Map
Identify mobile threats near me
Compliance Corner
Learn compliance practices
Post Perimeter Security Alliance
The future security alliances
Company

ABOUT US

Learn About Lookout


Partners
Partner with us today
Careers
Discover your next career
Foundation
Changing lives for the better
Leadership
Learn about our leadership
Life at Lookout
What drives us at Lookout
Newsroom
Check out the latest news
Login
PersonalEnterprisePartners
Contact Sales





WORK ANYWHERE WITH ENDPOINT-TO-CLOUD SECURITY

Collaboration is skyrocketing as data goes wherever it’s needed. To secure data
while respecting user privacy, you need an integrated endpoint-SASE solution.

Learn More


KNOW WHAT'S GOING ON LIKE YOU STILL HAVE A PERIMETER

With data and users everywhere, it’s hard to see what you’re up against.
Eliminate the guesswork by continuously assessing security, from endpoint to
cloud.

Learn More


MAKE SENSE OF THREAT DATA WITH UNIFIED INSIGHTS

Standalone tools make cybersecurity unnecessarily complex. We give you
actionable insight in one place to implement precise policies and hunt for
threats.

Learn More


ACCESS WHAT YOU NEED WITHOUT RISKING WHAT YOU VALUE

Cloud access doesn’t have to be all or nothing. Knowing the data and apps your
employees need, we dynamically provide only the trusted access required.

Learn More

Slide 2 of 4.




LOOKOUT ACQUIRES CIPHERCLOUD TO DELIVER INTEGRATED ENDPOINT TO CLOUD SECURITY

Read the CEO's Blog


RECENT ZERO TRUST WEBCAST - “ZERO TRUST: SECURITY FROM DEVICE TO CLOUD”

Watch The Video


PROTECT YOURSELF FROM POWERFUL PEGASUS SPYWARE

Read The Blog



WHY INTEGRATING ENDPOINT SECURITY AND SASE IS ESSENTIAL


Collaboration is skyrocketing as data goes wherever it’s needed. To securely tap
into this productivity you need secure access service edge (SASE), delivering
data protection in the cloud like you still have a perimeter. But existing SASE
technologies are invasive and clash with the users expectation of privacy when
working remotely, especially on their personal devices. Lookout integrates
endpoint security with SASE so you can secure data while respecting user
privacy.

Learn About MESLearn About CASBLearn About ZTNA


VISIBILITY LIKE YOU STILL HAVE A PERIMETER

It’s hard to see what you’re up against when your users are everywhere, using
networks you don’t control to access your data in the cloud. We eliminate the
guesswork by providing visibility into what’s happening at all times – on
unmanaged endpoints, in the cloud and everywhere in between.

Get More Visibility




UNIFIED INSIGHTS TO MAKE SENSE OF EVERYTHING


Standalone tools make cybersecurity unnecessarily complex, unintentionally
creating security gaps and human error. We give you actionable insights within a
single platform so you can implement precise policies, hunt for threats and
conduct forensic investigations.

Read SASE Brochure




SEAMLESS ACCESS WITH PRECISE CONTROLS

Cloud access doesn’t have to be all or nothing. Security shouldn’t interrupt
productivity or impair the user’s experience. With visibility and insights into
everything, we enable you to secure your data by dialing in precise access and
providing a seamless and efficient experience.

Get CASB Datasheet

Explore Endpoint to Cloud Security



ENDPOINT-TO-CLOUD SECURITY

MOBILE ENDPOINT SECURITY

iOS, Android and Chrome OS devices have as much access as other endpoints.
Without invading privacy, we can detect and respond to known and unknown
threats.

Close Your Mobile Gap


ZERO TRUST NETWORK ACCESS

Unlimited access isn’t the only way to provide remote access. Knowing what’s
needed, we dynamically provide them with only the access you need.

Replace Your VPN With ZTNA


CLOUD ACCESS SECURITY BROKER

Don’t give up control just because you now use cloud apps. We give you granular
control as if these apps are running inside your data center.

Stay In Control With CASB



WHAT ANALYSTS SAY ABOUT LOOKOUT

"Mobile Threat Defense is emerging as a component that enables implementation of
ZTNA for iOS and Android devices. MTD can provide an assessment of a device to a
ZTNA trust broker, which can decide whether to allow access to a specific
enterprise application."

Gartner Market Guide: MTD 2021, Dioniso Zumerle, Rob Smith

Read Report


“The interface is uncluttered, and the workflow for creating new policies is
easy to understand and manage. Administrators can get up to speed and create
effective policies quickly.”

Gartner Magic Quadrant: CASB 2020, Craig Lawson, Steve Riley

Read Report


“Lookout has a strong console and administrative functionality, where it can
display risky behavior of devices and apps across an entire network of devices.”

IDC MarketScape: MTM 2020, Phil Hochmuth

Read Report


"[Lookout CASB] provides differentiated capabilities such as native Rights
Management, Zero Trust Network Access (ZTNA), Email protection, and end-to-end
data protection with common enterprise SaaS, PaaS, and IaaS applications."

KuppingerCole Market Compass: CASB 2021, Mike Small

Read Report

View All Analyst Reports

LOOKOUT CASB+

June 29, 2021

REVIEWER ROLE

Security and Risk Management

COMPANY SIZE

<5,000 Employees

"EASE OF USE, VERY FUNCTIONAL REPORTING."



"From onboarding CASB+ we have experienced nothing but professionalism from
Lookout. They are a great company to work with. We have met with the team every
week and discussed the project. They provide us with great results each time."

Read Full Review



LOOKOUT MOBILE ENDPOINT SECURITY

June 25, 2021

REVIEWER ROLE

Program and Portfolio Management

COMPANY SIZE

Gov't/PS/ED 5,000 - 50,000 Employees


"LOOKOUT DEPLOYMENT: AN OUTSTANDING COLLABORATIVE EXPERIENCE"




"I am a project manager and worked with the Lookout team to deploy their agent
to our mobile endpoints of over 5,000 users. Their team were consummate
professionals and made the experience one of the most collaborative and
transparent that I've ever experienced in my career.


Read Full Review



LOOKOUT MOBILE ENDPOINT SECURITY

June 17, 2021

REVIEWER ROLE

CEO

COMPANY SIZE

<50M USD

"LOOKOUT PROVIDES EXCELLENT MOBILE SECURITY"



"We have used multiple mobile device security apps over the years, and always
found issues with them either not providing multiple layers of protection, or
their apps would randomly stop running. Lookout covers many threat vectors that
could allow bad actors to gain access to a mobile device, and it stays running
on the mobile devices."

Read Full Review







Write A ReviewRead All CASB ReviewsRead All MTD Reviews


HOW WE HELP OUR CUSTOMERS


SCHNEIDER ELECTRIC RAPIDLY DEPLOYS SECURITY TO GLOBAL FLEET

Schneider Electric is one of the global leaders in energy management and
automation solutions...

Read Case Study


FEDERAL SYSTEMS INTEGRATOR SECURES AGAINST MOBILE PHISHING


“Lookout enables people to work the way they want on their phones,” says
security...

Read Case Study


TOP US NATIONAL BANK DEPLOYS LOOKOUT CLOUD KEY SECURITY


Learn how a leading financial organization uses Lookout secure cloud
infrastructure to stay ahead...


Read Case Study



LOOKOUT DELIVERS ENDPOINT-TO-CLOUD SECURITY

REQUEST A DEMO

CONTACT SALES

FREE TRIAL

Contact Lookout
Contact Support
Contact Enterprise Sales
Worldwide Office Locations
Get Lookout for
Consumers
Enterprise
Small Businesses
Developers
Researchers
Resources
Analyst Reports
Blogs
Threat Lab
Podcasts
On-Demand Webinars
Upcoming Events
Products
Secure Access Service Edge
Mobile Endpoint Security
Zero Trust Network Access
Cloud Access Security Broker
Threat Intelligence

Select Language
EnglishJapaneseGermanFrenchItalian

Legal
|
Privacy Policy
|
Cookie Policy
|
Transparency Report
|
Do not sell my personal information (California residents)
© 2021 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield
Design®, SCREAM®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc.
in the United States and other countries. EVERYTHING IS OK®, LOOKOUT MOBILE
SECURITY®, POWERED BY LOOKOUT®, and PROTECTED BY LOOKOUT®, are registered
trademarks of Lookout, Inc. in the United States; and POST PERIMETER SECURITY
ALLIANCE    are trademarks of Lookout, Inc.

Android is a trademark of Google Inc.

Apple, the Apple logo, and iPhone are trademarks of Apple Inc., registered in
the U.S. and other countries. App Store is a service mark of Apple Inc.



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Back Button Performance Cookies



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Privacy Notice

Accept All Cookies
Cookies Settings