Mobile: cloud security and endpoint security on one platform

Mobile: cloud security and endpoint security on one platform

Share post

Lookout's cloud security platform for all mobile endpoints brings together endpoint security and cloud security, reducing risk and enabling a unified response to application and data threats.

Lookout has announced the addition of new capabilities and features to its Cloud Security Platform. The result is currently the only solution in the industry for endpoint to cloud security. The cloud-native platform includes a unified policy framework for managing and enforcing policies across mobile, cloud, web, and proprietary applications. Platform innovations also include a unified agent and control plane for mobile and cloud security services, providing IT and security leaders with cost-effective, simplified management capabilities.

Security for hybrid workforces

According to a recent Gartner survey, 60 percent of knowledge workers work remotely. A report published by Zippia also shows that 75 percent of employees use their personal cell phones for work. As organizations continue to enable their employees to work remotely, either 100 percent or in a hybrid model, the use of mobile devices to access corporate applications, regardless of user or location, is increasing. Employees working outside of traditional data center boundaries, accessing applications in the cloud and using devices not managed by corporate IT, increase the need for a security solution designed for a flexible workforce that “tracks” corporate data and protects wherever you are or are.

Security Service Edge (SSE) and Endpoint Security

Mobile security services on one platform (Image: Lookout).

Lookout's Cloud Security Platform brings together Security Service Edge (SSE) and Endpoint Security to protect users and data wherever they are. It continuously monitors the risk posture of users and devices to enable dynamic and granular zero-trust access based on the specific situation of applications and data: In this way, companies can protect their employees, their devices, applications and data from unauthorized access and protect against modern Internet-based threats. The expanded platform provides customers with the ability to use threat intelligence from mobile endpoints to make better-informed decisions for cloud security services.

Mobile security services on one platform

Based on the company's patented technologies, Lookout's Cloud Security Platform brings together the following security services:

  • Lookout Mobile Endpoint Security Enables a secured way of working from mobile devices - personal, managed and unmanaged iOS, Android and Chromebook devices. It reduces the risk of attacks by protecting against socially engineered phishing campaigns, malicious and third-party applications, risky network connections and total device compromise.
  • Lookout Secure Private Access is a cloud-delivered Zero Trust Network Access (ZTNA) solution based on the Zero Trust principle that provides seamless access to private enterprise applications, regardless of where the user or application is located. Unlike a VPN (Virtual Private Network), Lookout's Secure Private Access connects users to the applications and not to the network - a core principle of a Zero Trust architecture.
  • Lookout Secure Internet Access is a cloud-delivered Secure Web Gateway (SWG) with a Firewall as a Service (FWaaS) built on Zero Trust principles to protect users, underlying networks and corporate data from Internet-based threats and prevent data leakage .
  • Lookout Secure Cloud Access, the company's Cloud Access Security Broker (CASB) solution, provides seamless security for all cloud and SaaS applications with unified policies, trusted data security, and benchmarked standardized compliance. It offers complete transparency and control.
More at Lookout.com

 


About Lookout

Lookout co-founders John Hering, Kevin Mahaffey, and James Burgess came together in 2007 with the goal of protecting people from the security and privacy risks posed by an increasingly connected world. Even before smartphones were in everyone's pocket, they realized that mobility would have a profound impact on the way we work and live.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more