SlideShare a Scribd company logo
1 of 2
Download to read offline
1
DATASHEET
Lookout Mobile Endpoint Security
Visibility into mobile threats & data leakage
Overview
Many organizations are now embracing the use of smartphones and
tablets to increase productivity in the workplace. However, this era
of mobility introduces new risks to enterprise data. Lookout Mobile
Endpoint Security enables secure mobility by providing comprehensive
risk management across iOS and Android devices to protect against app,
network, and device-based threats while providing visibility and control
over data leakage.
How It Works
Lookout Mobile Endpoint Security leverages a lightweight endpoint app
on employee devices, a cloud-based admin console that provides real-
time visibility into threats and data leakage, and integration with leading
Enterprise Mobility Management (EMM) solutions.
Benefits
Productivity without compromise
We empower your organization to fully
adopt secure mobility across personal
and corporate owned devices without
compromising productivity, employee
privacy, or user experience
Data leakage control
Lookout allows you to set policies against
non-compliant mobile apps that pose a data
leakage risk
Threat protection
Lookout protects your organization from
mobile threats across apps, network, and
device
Proven risk reduction
Forward-thinking organizations have
achieved measurable risk reduction with
Lookout Mobile Endpoint Security
Low TCO
Integrates with your existing EMM solution
to seamlessly deploy the Lookout app,
with a 95% self-remediation rate to limit
helpdesk tickets
Respects user privacy
Lookout collects the minimum amount of
personal information to protect both personally
owned and corporate-owned devices
Lookout
Security Cloud
Untrusted
Device Alert
Lookout Endpoint App
Lookout
Admin Console
1 3
2
API
Integration
Alert passed
to EMM
Risk Detected
EMM Console
!
Risk Detected
!
4
Lookout Admin Alert
Automated Remediation
!
Our solution is powered by the
Lookout Security Cloud, which
comprises over 100M global
sensors and over 30M apps.
This global sensor network
enables our platform to be
predictive by letting machine
intelligence identify complex
patterns that indicate risk.
© 2016 Lookout, Inc. All rights reserved. Lookout, the Shield Logo, and Everything is OK are registered trademarks of Lookout, Inc. All other brand and product names
are trademarks or registered trademarks of their respective holders. 20161024-Lookout-USv2.5
1-888-988-5795 | lookout.com
2
Mobile Endpoint Security for Threats
As more sensitive data is accessed by mobile devices, they are increasingly
becoming a target for attackers. Lookout Mobile Endpoint Security
identifies mobile threats targeting these primary attack vectors:
•	 App-based threats: Malware, rootkits, and sideloaded apps
•	 Network-based threats: Man-in-the-middle attacks
•	 Device-based threats: Jailbroken/rooted mobile devices
Mobile Endpoint Security for App Risks
Some iOS and Android apps are not malicious, but they exhibit sensitive
behaviors that may leak data, contravening the security policy of an
organization or even violate regulatory requirements around data loss.
Lookout provides comprehensive visibility into these app risks within your
mobile fleet, enabling admins to both monitor and set actionable policies
against apps at risk of violating internal or regulatory requirements.
The Lookout Difference
•	 Lookout has amassed one of the world’s largest mobile security
datasets due to our global scale and mobile focus. This has created a
global sensor network of over 100M mobile sensors and 30M apps,
with 90K new apps added daily.
•	 This global sensor network enables our platform to be predictive by
letting machine intelligence identify complex patterns that indicate
risk. These patterns would otherwise escape human analysts.
•	 Mobile is a new era of computing and requires a new era of security
solution designed exclusively for this platform. Lookout has been
securing mobility since 2007 and has expertise in this space.
Lookout empowers your organization to adopt secure mobility without
compromising productivity by providing the visibility IT and security teams
need. To learn how you can secure your mobile fleet today, contact us at
info@lookout.com
Lookout Mobile Endpoint Security
Mobile Endpoint Security for Threats
App-based threat protection
Malware
Rootkits
Spyware
Sideloaded apps
Network-based threat protection
Man-in-the-Middle attacks
SSL attacks
Device-based threat protection
Jailbreak detection
Root detection
Custom threat policies
Threat dashboard
Mobile Endpoint Security for App Risks
Data leakage control from apps that:
Access sensitive data, such as calendar
Send sensitive data (PII) externally
Communicate with cloud services
Risky apps dashboard
App risk monitoring
Custom policies for risky apps
App blacklisting
Enterprise app review
Management and Support
EMM integration
(Intune, Airwatch, MobileIron, MaaS360)
Exec-level reports showing risk reduction
Role-based access control
Data privacy controls
24/7 Support
No sensitive
behaviors
Some sensitive
behaviors
Malicious
behaviors

More Related Content

What's hot

Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your BusinessAll Covered
 
Moses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesMoses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesPapitha Velumani
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirateswebnowires
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 

What's hot (20)

Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Security and Your Business
Security and Your BusinessSecurity and Your Business
Security and Your Business
 
Moses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesMoses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On Smartphones
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
MobileIron Threat Defense
MobileIron Threat DefenseMobileIron Threat Defense
MobileIron Threat Defense
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
 
Mobile security
Mobile securityMobile security
Mobile security
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 

Similar to Lookout Mobile Endpoint Security Datasheet (US - v2.5)

Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat PreventionMarketingArrowECS_CZ
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory CR Group
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfWebtrills1
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...IBM Security
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 

Similar to Lookout Mobile Endpoint Security Datasheet (US - v2.5) (20)

Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 

Lookout Mobile Endpoint Security Datasheet (US - v2.5)

  • 1. 1 DATASHEET Lookout Mobile Endpoint Security Visibility into mobile threats & data leakage Overview Many organizations are now embracing the use of smartphones and tablets to increase productivity in the workplace. However, this era of mobility introduces new risks to enterprise data. Lookout Mobile Endpoint Security enables secure mobility by providing comprehensive risk management across iOS and Android devices to protect against app, network, and device-based threats while providing visibility and control over data leakage. How It Works Lookout Mobile Endpoint Security leverages a lightweight endpoint app on employee devices, a cloud-based admin console that provides real- time visibility into threats and data leakage, and integration with leading Enterprise Mobility Management (EMM) solutions. Benefits Productivity without compromise We empower your organization to fully adopt secure mobility across personal and corporate owned devices without compromising productivity, employee privacy, or user experience Data leakage control Lookout allows you to set policies against non-compliant mobile apps that pose a data leakage risk Threat protection Lookout protects your organization from mobile threats across apps, network, and device Proven risk reduction Forward-thinking organizations have achieved measurable risk reduction with Lookout Mobile Endpoint Security Low TCO Integrates with your existing EMM solution to seamlessly deploy the Lookout app, with a 95% self-remediation rate to limit helpdesk tickets Respects user privacy Lookout collects the minimum amount of personal information to protect both personally owned and corporate-owned devices Lookout Security Cloud Untrusted Device Alert Lookout Endpoint App Lookout Admin Console 1 3 2 API Integration Alert passed to EMM Risk Detected EMM Console ! Risk Detected ! 4 Lookout Admin Alert Automated Remediation ! Our solution is powered by the Lookout Security Cloud, which comprises over 100M global sensors and over 30M apps. This global sensor network enables our platform to be predictive by letting machine intelligence identify complex patterns that indicate risk.
  • 2. © 2016 Lookout, Inc. All rights reserved. Lookout, the Shield Logo, and Everything is OK are registered trademarks of Lookout, Inc. All other brand and product names are trademarks or registered trademarks of their respective holders. 20161024-Lookout-USv2.5 1-888-988-5795 | lookout.com 2 Mobile Endpoint Security for Threats As more sensitive data is accessed by mobile devices, they are increasingly becoming a target for attackers. Lookout Mobile Endpoint Security identifies mobile threats targeting these primary attack vectors: • App-based threats: Malware, rootkits, and sideloaded apps • Network-based threats: Man-in-the-middle attacks • Device-based threats: Jailbroken/rooted mobile devices Mobile Endpoint Security for App Risks Some iOS and Android apps are not malicious, but they exhibit sensitive behaviors that may leak data, contravening the security policy of an organization or even violate regulatory requirements around data loss. Lookout provides comprehensive visibility into these app risks within your mobile fleet, enabling admins to both monitor and set actionable policies against apps at risk of violating internal or regulatory requirements. The Lookout Difference • Lookout has amassed one of the world’s largest mobile security datasets due to our global scale and mobile focus. This has created a global sensor network of over 100M mobile sensors and 30M apps, with 90K new apps added daily. • This global sensor network enables our platform to be predictive by letting machine intelligence identify complex patterns that indicate risk. These patterns would otherwise escape human analysts. • Mobile is a new era of computing and requires a new era of security solution designed exclusively for this platform. Lookout has been securing mobility since 2007 and has expertise in this space. Lookout empowers your organization to adopt secure mobility without compromising productivity by providing the visibility IT and security teams need. To learn how you can secure your mobile fleet today, contact us at info@lookout.com Lookout Mobile Endpoint Security Mobile Endpoint Security for Threats App-based threat protection Malware Rootkits Spyware Sideloaded apps Network-based threat protection Man-in-the-Middle attacks SSL attacks Device-based threat protection Jailbreak detection Root detection Custom threat policies Threat dashboard Mobile Endpoint Security for App Risks Data leakage control from apps that: Access sensitive data, such as calendar Send sensitive data (PII) externally Communicate with cloud services Risky apps dashboard App risk monitoring Custom policies for risky apps App blacklisting Enterprise app review Management and Support EMM integration (Intune, Airwatch, MobileIron, MaaS360) Exec-level reports showing risk reduction Role-based access control Data privacy controls 24/7 Support No sensitive behaviors Some sensitive behaviors Malicious behaviors