SlideShare a Scribd company logo
1 of 22
Download to read offline
THE HISTORY OF
LOOKOUT
John Hering, Kevin Mahaffey and
James Burgess, three security
researchers from USC, discovered
a Bluetooth vulnerability in the
Nokia 3610.
The researchers tried to work with
Nokia to patch the vulnerability.
But the vulnerability would be too
complex to fix, and Nokia believed
that the range of Bluetooth was
only 10 — 100 meters.
2004
The Nokia 6310
The first mobile phone
with Bluetooth capabilities
To demonstrate the Bluetooth vulnerability, the founders built the BlueSniper,
which set a new world record by retrieving information on a device from over
1 mile away using the Bluetooth connections in mobile phones.
Living in LA at the time, the three
researchers walked around the red
carpet of the Academy Awards
with a high-powered Bluetooth
antenna, collecting evidence of the
vulnerability from hundreds of
celebrities’ phones.
2007
Realizing that people would need protection from mobile-based threats…
John Hering, Kevin Mahaffey & James Burgess officially
founded Lookout, then known as Flexilis, in 2007.
The first security app for
Windows mobile launched
2008
Lookout Mobile Security launched
on Android.
Lookout received a $5.5M Series A
round of funding from Khosla
Ventures & Trilogy Partners.
The same year, the company made
the move to San Francisco, left the
name Flexilis behind and became
Lookout.
2010
A BIG YEAR FOR LOOKOUT
Steven Mileham, 2011, Flickr
That was just the beginning…
2010
BusinessWeek names John Hering
Best Young Tech Entrepreneur
of 2010
Lookout tops 1 million users
Introduced Lookout Premium
for Android
Lookout joins leading tech
companies as an Accel Partners’ and
Index Ventures’ portfolio company
Lookout partners with Sprint to help keep Sprint customers safe
Lookout increases its user base by 9 million in one year, protecting
10 million devices
Andreessen Horowitz invests in Lookout and joins the board
Lookout Mobile Security launches on iPhone
 	
  
 	
  
 	
  
 	
  
2011
LOOKOUT MAKES BIG STRIDES
2011
Lookout goes global,
expanding its product offering
to Canada, Australia & the UK,
and is localized in German
2012
Lookout moves to new digs in the heart of SF’s Financial District
2012
A monumental year for key
partnerships with mobile
operators
2013
Lookout was named a 2013
Technology Pioneer by the World
Economic Forum
2012
In October 2012, Lookout debuted its
redesigned consumer offering with a
sleek new design, intelligent
dashboard and Signal Flare
LOOKOUT TODAY
2013
SINCE THE BEGINNING
The resounding theme has been growth
Partnered with 5 major mobile operators
Supports 3 platforms (Android, iOS & Kindle)
Localized in 11 languages


OCT 2008 JULY 2013OCT 2010
1M
3M
23M
45M
11M
45 MILLION
USERS WORLDWIDE
“The greatest product I’ll ever create is my company.”
— John Hering, Lookout CEO
THE LOOKOUT TEAM CONTINUES TO GROW
The Lookout Platform provides
organizations with threat intelligence and
attribution data to help protect their
customers, products, devices and networks
from constantly evolving threats.
More and more employees are bringing their
devices to work and company data is ending
up on them. Lookout for Business aims to
help businesses keep confidential
information secure.
THE ROAD AHEAD
LOOKOUT
For Business
THE LOOKOUT
PLATFORM
Keep in touch with
@lookout
/mylookout
blog.lookout.com
contact@lookout.com
http://bit.ly/history-of-lookout

More Related Content

What's hot

The negative impact of social media
The negative impact of social mediaThe negative impact of social media
The negative impact of social media
Proe24
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

What's hot (20)

whats app
whats appwhats app
whats app
 
Impact of social media on teenagers- Presentation
Impact of social media on teenagers- PresentationImpact of social media on teenagers- Presentation
Impact of social media on teenagers- Presentation
 
The negative impact of social media
The negative impact of social mediaThe negative impact of social media
The negative impact of social media
 
Impacts of social media
Impacts of social mediaImpacts of social media
Impacts of social media
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Your Cell Phone is my Drug
Your Cell Phone is my DrugYour Cell Phone is my Drug
Your Cell Phone is my Drug
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Are you a smartphone addict?
Are you a smartphone addict?Are you a smartphone addict?
Are you a smartphone addict?
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
The influence media on young generation ppt
The influence media on young generation pptThe influence media on young generation ppt
The influence media on young generation ppt
 
Social media
Social mediaSocial media
Social media
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Social media and mental health 5
Social media and mental health 5Social media and mental health 5
Social media and mental health 5
 
Social Media
Social MediaSocial Media
Social Media
 
Effect of Mobile phones on Student Life
 Effect of Mobile phones on Student Life Effect of Mobile phones on Student Life
Effect of Mobile phones on Student Life
 
The smartphone addiction
The smartphone addictionThe smartphone addiction
The smartphone addiction
 
Digital media in bangladesh
Digital media in bangladeshDigital media in bangladesh
Digital media in bangladesh
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
EFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON USEFFECT OF SOCIAL MEDIA ON US
EFFECT OF SOCIAL MEDIA ON US
 
Social media
Social mediaSocial media
Social media
 

Similar to History of Lookout

Content Strategy Across Connected Devices
Content Strategy Across Connected DevicesContent Strategy Across Connected Devices
Content Strategy Across Connected Devices
Brandon Carson
 
Projectglass
ProjectglassProjectglass
Projectglass
Sri Ramya
 
Mobile Technologies.pptx
Mobile Technologies.pptxMobile Technologies.pptx
Mobile Technologies.pptx
BryCunal
 

Similar to History of Lookout (20)

Digital Media and Consumer Electronics Trendspotting
Digital Media and Consumer Electronics TrendspottingDigital Media and Consumer Electronics Trendspotting
Digital Media and Consumer Electronics Trendspotting
 
T-Mobile G1
T-Mobile G1T-Mobile G1
T-Mobile G1
 
Content Strategy Across Connected Devices
Content Strategy Across Connected DevicesContent Strategy Across Connected Devices
Content Strategy Across Connected Devices
 
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
Silceni Awarded Ministry of Defence Innovation Funding to Further Graphene Re...
 
CONSUMER PREFERENCES ON NOKIA MOBILE
CONSUMER PREFERENCES ON NOKIA MOBILE CONSUMER PREFERENCES ON NOKIA MOBILE
CONSUMER PREFERENCES ON NOKIA MOBILE
 
5 Ways IoT is shaping the Future of App Development
5 Ways IoT is shaping the Future of App Development5 Ways IoT is shaping the Future of App Development
5 Ways IoT is shaping the Future of App Development
 
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
Google – Motorola vs. Microsoft – Nokia: Utter Failure vs. Smart Acquisition?...
 
Consumer buying behaviour
Consumer buying behaviourConsumer buying behaviour
Consumer buying behaviour
 
A PROJECT REPORT ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
A PROJECT REPORT  ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONEA PROJECT REPORT  ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
A PROJECT REPORT ON A STUDY ON CONSUMER BUYING BEHAVIOR TOWARDS SMARTPHONE
 
Google glass final
Google glass finalGoogle glass final
Google glass final
 
Branded Content (in Mobile) by Chris Schaumann
Branded Content (in Mobile) by Chris SchaumannBranded Content (in Mobile) by Chris Schaumann
Branded Content (in Mobile) by Chris Schaumann
 
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMPERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
 
Projectglass
ProjectglassProjectglass
Projectglass
 
Wearables and Google Glass
Wearables and Google GlassWearables and Google Glass
Wearables and Google Glass
 
Secure Open Telephony Network Presentation at Hope 9
Secure Open Telephony Network Presentation at Hope 9Secure Open Telephony Network Presentation at Hope 9
Secure Open Telephony Network Presentation at Hope 9
 
BBDF (2)
BBDF (2)BBDF (2)
BBDF (2)
 
Mobile Technologies.pptx
Mobile Technologies.pptxMobile Technologies.pptx
Mobile Technologies.pptx
 
User Interface and Future Interaction Technologies
User Interface and Future Interaction Technologies User Interface and Future Interaction Technologies
User Interface and Future Interaction Technologies
 
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
Business Innovation and Mobile Web Solutions Presentation at Georgetown Unive...
 
PESTE analysis - Nokia
PESTE analysis - NokiaPESTE analysis - Nokia
PESTE analysis - Nokia
 

More from Lookout

2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 

More from Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

History of Lookout

  • 2. John Hering, Kevin Mahaffey and James Burgess, three security researchers from USC, discovered a Bluetooth vulnerability in the Nokia 3610. The researchers tried to work with Nokia to patch the vulnerability. But the vulnerability would be too complex to fix, and Nokia believed that the range of Bluetooth was only 10 — 100 meters. 2004 The Nokia 6310 The first mobile phone with Bluetooth capabilities
  • 3. To demonstrate the Bluetooth vulnerability, the founders built the BlueSniper, which set a new world record by retrieving information on a device from over 1 mile away using the Bluetooth connections in mobile phones.
  • 4. Living in LA at the time, the three researchers walked around the red carpet of the Academy Awards with a high-powered Bluetooth antenna, collecting evidence of the vulnerability from hundreds of celebrities’ phones. 2007
  • 5. Realizing that people would need protection from mobile-based threats… John Hering, Kevin Mahaffey & James Burgess officially founded Lookout, then known as Flexilis, in 2007.
  • 6. The first security app for Windows mobile launched 2008
  • 7. Lookout Mobile Security launched on Android. Lookout received a $5.5M Series A round of funding from Khosla Ventures & Trilogy Partners. The same year, the company made the move to San Francisco, left the name Flexilis behind and became Lookout. 2010 A BIG YEAR FOR LOOKOUT
  • 8. Steven Mileham, 2011, Flickr That was just the beginning…
  • 9. 2010 BusinessWeek names John Hering Best Young Tech Entrepreneur of 2010 Lookout tops 1 million users Introduced Lookout Premium for Android Lookout joins leading tech companies as an Accel Partners’ and Index Ventures’ portfolio company
  • 10. Lookout partners with Sprint to help keep Sprint customers safe Lookout increases its user base by 9 million in one year, protecting 10 million devices Andreessen Horowitz invests in Lookout and joins the board Lookout Mobile Security launches on iPhone             2011 LOOKOUT MAKES BIG STRIDES
  • 11. 2011 Lookout goes global, expanding its product offering to Canada, Australia & the UK, and is localized in German
  • 12. 2012
  • 13. Lookout moves to new digs in the heart of SF’s Financial District
  • 14. 2012 A monumental year for key partnerships with mobile operators
  • 15. 2013 Lookout was named a 2013 Technology Pioneer by the World Economic Forum
  • 16. 2012 In October 2012, Lookout debuted its redesigned consumer offering with a sleek new design, intelligent dashboard and Signal Flare
  • 18. 2013 SINCE THE BEGINNING The resounding theme has been growth Partnered with 5 major mobile operators Supports 3 platforms (Android, iOS & Kindle) Localized in 11 languages  
  • 19. OCT 2008 JULY 2013OCT 2010 1M 3M 23M 45M 11M 45 MILLION USERS WORLDWIDE
  • 20. “The greatest product I’ll ever create is my company.” — John Hering, Lookout CEO THE LOOKOUT TEAM CONTINUES TO GROW
  • 21. The Lookout Platform provides organizations with threat intelligence and attribution data to help protect their customers, products, devices and networks from constantly evolving threats. More and more employees are bringing their devices to work and company data is ending up on them. Lookout for Business aims to help businesses keep confidential information secure. THE ROAD AHEAD LOOKOUT For Business THE LOOKOUT PLATFORM
  • 22. Keep in touch with @lookout /mylookout blog.lookout.com contact@lookout.com http://bit.ly/history-of-lookout