www.lookout.com
Open in
urlscan Pro
2600:9000:20e1:6e00:8:1c11:1200:93a1
Public Scan
Submitted URL: http://lookout.com/
Effective URL: https://www.lookout.com/
Submission: On July 26 via manual from US — Scanned from DE
Effective URL: https://www.lookout.com/
Submission: On July 26 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Type here to search..."
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>suchen</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="Ergebnisse löschen"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id2" dir="ltr" spellcheck="false" placeholder="Type here to search..."
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>suchen</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="Ergebnisse löschen"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip Navigation × suchen Benutzerdefinierte Suche Sortieren nach: Relevance Relevance Date Products Solutions Company Resources LoginSupportLanguage Go to Lookout Life Login EnterprisePersonalPartners Support Enterprise Support LoginEnterprise Support Programs EN 日本語DeutschFrançaisItaliano Go to Lookout Life × suchen Benutzerdefinierte Suche Sortieren nach: Relevance Relevance Date Back To All Back To Products Products Cloud Security Endpoint Security Technology Secure the future of your data, today. Explore how to unleash business innovation with easier and more effective data control. Watch the video Cloud Security Cloud-native SSE data protection controlled by one flexible and easy-to-use interface. Lookout Secure Cloud Access (CASB)Lookout Secure Internet Access (SWG)Lookout Secure Private Access (ZTNA) Endpoint Security Secure and protect connected users, devices, and apps wherever they are. Lookout Mobile Endpoint Security Lookout Threat Intelligence DLP TBD EDRM TBD UEBA TBD Advanced Policy Engine TBD Single Proxy Architecture TBD Phishing & Content Protection TBD Secure the future of your data, today. Explore how to unleash business innovation with easier and more effective data control. Back To All Back To Solutions Solutions By Use Case By Industry Secure the future of your data, today. Explore how to unleash business innovation with easier and more effective data control. Accelerate Mergers & Acquisitions Keep everything running smoothly through mergers and acquisitions. Adopt the Cloud Faster Move to the cloud faster while improving security and productivity. Detect & Mitigate Cyber Threats Everything you need to detect and mitigate threats in real time. Meet Privacy & Compliance Demands Workers and data are everywhere, your security should be too. Promote Secure Collaboration Collaborate securely and productively from anywhere in the world. Secure Remote & Hybrid Work Workers and data are everywhere, your security should be too. Education Protect student data without sacrificing privacy. Federal Government Meet demand for Zero Trust mandates with unified data protection. Financial Services Provide digital-first services while protecting customer data. Healthcare Protect patient data, minimize risk, and maximize compliance. Manufacturing Protect valuable data and IP no matter where it goes. State & Local Government Securely move to the cloud and safeguard mobile devices. Secure the future of your data, today. Explore how to unleash business innovation with easier and more effective data control. Back To All Back To Company Company About Us Careers News & Events Partners New rules. For a new world. Explore how we're creating the future of data security and ensuring peace of mind for all. Watch the Video Our Story Data protection that lets businesses prosper. Leadership & Board Learn more about our leaders. The Lookout Foundation Creating positive impact in our communities. Customers Learn more about our customers. Contact Us Get in touch with our team. Life at Lookout Take your next career step alongside a diverse team built on a foundation of trust and innovative spirit. Join our Team Browse job openings and explore roles that are shaping the future of data security. Upcoming Events Discover what’s coming up next for Lookout. Newsroom Explore press releases, news resources and event information. Partners Overview Explore our ecosystem partnerships. Carrier Partners Channel Partners Technology Partners MSSP Partners New rules. For a new world. Explore how we're creating the future of data security and ensuring peace of mind for all. Back To All Back To Resources Resources Blog Community Glossary Resource Library Explore, learn and discover. Find insights and information about keeping your data safe. Visit Our Blog Join Our Community Go to Business Resource Center Go to Personal Resource Center Explore All Resources Discover the Latest Threats Blog Our latest news, information and perspectives. Latest Blogs Lookout Announces Advanced Traffic Steering Agents to Replace Virtual Private Networks Why Should Enterprises Care about APTs? Chinese Cyber Espionage Groups and Other Nation-State Attacks What to Know and What to Do About the MOVEit Vulnerabilities Community Find the latest community events, webinars, podcasts and more from Lookout. Personal Resource Center Explore all business data security related resources to uncover information, insights, and more. Account & Password Management Podcasts Enjoy our Security Soapbox podcast, listen in to learn about the latest threat intel and more. Webinars Explore our many conversations with top industry leaders in cybersecurity. Video View our ever growing library of informative videos, use-case explanations and more. Upcoming Events Meet our team and learn from cybersecurity experts in one of our upcoming events. Explore All Terms Stay up to date with the newest terminology and technologies in the space. What is CASB? What is DLP? What is SASE? What is SSE? What is UEBA? What is Zero Trust? What is ZTNA? Resource Library Documentation to help businesses prosper in a fluid, privacy-first world. Latest Resources The Global State of Mobile Phishing Report Explore, learn, discover. Latest news, threat info, and security updates from the leaders in cloud security. Visit Our Blog Join Our Community Explore All Resources Discover the Latest Threats Back To All Back To Business Login Enterprise Partners Back To All Back To Business Support Enterprise Support Login Enterprise Support Programs Back To All Back To Business Language 日本語 Deutsch Français Italiano Minimize risk and secure your corporate data today, request a free demo. Request Demo Protect data and control access with cloud-native, converged SASE and SSE. Explore our Cloud Security THE DATA-CENTRIC CLOUD SECURITY PLATFORM Lookout Cloud Security Platform is the only cloud-native solution that delivers zero trust security by reducing risk, and protecting your corporate data on any device, any app, any location. With a centralized dashboard and unified policy framework, Lookout helps you consolidate vendors for endpoint security and cloud security. Learn More Secure your endpoints from any internet, device, network, and app level threats. Explore our Endpoint Security The Latest BUILDING THE FUTURE OF DATA PROTECTION. View All Latest News LOOKOUT ANNOUNCES THE SUCCESSFUL DIVESTITURE OF ITS CONSUMER MOBILE SECURITY BUSINESS SEGMENT. Read News Release LOOKOUT SCORED AMONG THE HIGHEST THREE VENDORS IN ALL USE CASES IN THE 2023 GARTNER® CRITICAL CAPABILITIES SECURITY SERVICE EDGE (SSE). Download Analyst Report MOBILE PHISHING ATTACKS ARE THE TIP OF THE SPEAR FOR MORE ADVANCED CAMPAIGNS THAT POSE SERIOUS RISK TO YOUR DATA. Download Report ORGANIZATIONS NEED A NEW APPROACH TO SECURITY SO THAT THEY CAN KEEP PACE WITH THE WAY REMOTE USERS ACCESS DATA AND COLLABORATE WITH EACH OTHER. Download Report Technology CONSOLIDATE AND SIMPLIFY YOUR IT SECURITY INFRASTRUCTURE. Combine endpoint security with Security Service Edge and Zero Trust frameworks into a unified solution and get centralized visibility and control over corporate data stored or in use anywhere. What does Zero Trust really mean? How does SASE relate to SSE? Visit the Glossary PROTECT DATA STORED IN CLOUD AND SAAS APPS AND ENHANCE USER EXPERIENCES. Lookout Secure Cloud Access ZERO TRUST PROTECTION FROM INTERNET THREATS FOR USERS, DEVICES, AND DATA. Lookout Secure Internet Access SECURE ACCESS AND PROTECT DATA IN APPS HOSTED ON-PREM OR IN THE CLOUD. Lookout Secure Private Access PROTECT DEVICES FROM KNOWN AND UNKNOWN THREATS WITH TELEMETRY INTELLIGENCE. Lookout Mobile Endpoint Security EFFORTLESSLY INTEGRATE EXISTING APPS AND TOOLS FOR UNIFIED CONTROL AND TOTAL VISIBILITY. The Lookout Difference ONE PLATFORM. ONE AGENT. ONE DASHBOARD. ONE POLICY FRAMEWORK → COMPLETE PROTECTION. Learn More PROVIDE A SECURE HYBRID WORK ENVIRONMENT Enable your hybrid workforce to be productive and work securely from anywhere, on any device by providing secure access to any app. Prevent data exfiltration from any device, app, or cloud while empowering workers to share sensitive data and collaborate freely with co-workers across organizations Secure Hybrid Work Promote Collaboration Securely SIMPLIFY YOUR IT SECURITY FOR BETTER EFFICIENCY AND SECURITY Consolidate your IT security vendors with a completely integrated stack for endpoint and cloud security Integrate with your existing identity, mobile device management (MDM), and networking investments to ensure your clouds are properly configured and data is protected. Adopt the Cloud Faster Accelerate Mergers and Acquisitions REDUCE SECURITY RISK TO YOUR ORGANIZATION Protect users, devices, and data from malicious threats without sacrificing confidentiality, availability or performance. Detect and Mitigate Cyber Threats Meet Privacy and Compliance Demands Businesses, governments, and millions of individuals around the world have trusted Lookout to safeguard their data. 500+ Businesses worldwide 200m Individuals' personal data 205m+ Mobile devices 170m Mobile apps 16.5k SaaS apps 500+ Threat families Lookout has a strong console and administrative functionality, where it can display risky behavior of devices and apps across an entire network of devices. Phil Hochmuth Industry Analyst Read Review The only solution that lowers costs and simplifies security and access control across all touchpoints, cloud, and on-premises systems. It has given us complete control over access management and security. Gartner Review Lookout Cloud Security Read Review Lookout CASB is indeed a genuine clear favorite not just in terms of protection but also in terms of manageability; no other solution delivers such a considerable standard of protection and component set. Gartner Review Lookout Cloud Security Read Review 4.6 90 Ratings on Gartner Peer Insights (Submit a review) As of 26 Jul 2023 DIGITAL INFORMATION MOVES WITHOUT BOUNDARIES OR LIMITS. GET SECURITY THAT MOVES WITH IT. SEE FIRST HAND WHAT UNIFIED DATA PROTECTION REALLY LOOKS LIKE. Schedule Demo START PROTECTING THE FUTURE OF YOUR DATA BY CONNECTING WITH OUR TEAM. Contact Sales UNCOVER BLIND SPOTS AND INSIGHTS WITH A FREE RISK ASSESSMENT. Start Risk Assessment Lookout Cloud Security Cloud SecurityLookout Secure Cloud AccessLookout Secure Internet AccessLookout Secure Private Access Lookout Endpoint Security Endpoint SecurityLookout Mobile Endpoint SecurityLookout Threat Intelligence Solutions Secure Hybrid WorkMeet Compliance & Privacy RegulationsPromote Collaboration SafelyDetect & Mitigate ThreatsAdopt the Cloud FasterAccelerate Mergers & Acquisitions Industries HealthcareEducationFederal GovernmentState & Local GovernmentFinancial ServicesManufacturing LegalPrivacy PolicyCookie PolicyTransparency Report Do not sell or share my personal information Compliance CornerSitemap © 2023 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, the 4 Bar Shield Design, and the Lookout multi-color/multi-shaded Wingspan design. By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Accept All Cookies Reject All Cookies Settings PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly necessary cookies are classified as cookies that must be present for the website to provide the basic functions of the website. They are essential to be able to access features of the website and could include signing in, adding items to a cart, or e-billing. PERFORMANCE COOKIES Performance Cookies Performance cookies are cookies used specifically for gathering data on how visitors use a website, which pages of a website are visited most often, or if they get error messages on web pages. These cookies monitor only the performance of the site as the user interacts with it. These cookies don’t collect identifiable information on visitors, which means all the data collected is anonymous and only used to improve the functionality of a website. FUNCTIONAL COOKIES Functional Cookies Functional cookies allow websites to remember the user’s site preferences and choices they make on the site including username, region, and language. This allows the website to provide personalized features like local news stories and weather if you share your location. They are anonymous and don’t track browsing activity across other websites. DO NOT SELL OR SHARE MY PERSONAL INFORMATION Do not sell or share my personal information You have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link. If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences. * TARGETING COOKIES Switch Label label Targeting cookies are specifically designed to gather information from you on your device to display advertisements to you based on relevant topics that interest you. Advertisers will place these cookies on a website with the website operator’s permission. The information the cookies gather on you can be shared with other advertisers to measure the performance of their advertisements. Additionally, another purpose of targeting and advertising cookies is to build user profiles from visitors to the website to gather statistics on the performance of the advertisements that can carry across many websites. Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices