Overview

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world's leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron.

Products

Mobile Endpoint Security: Solutions for organizations. Providing comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.

App Security: A solution for public app stores. An API-based, app-vetting solution for public app stores that analyzes developer-submitted apps for the presence of malware and exposes their capabilities and behaviors to determine their level of security risk.

Threat Intelligence: Deeper insight into the world's mobile threats. Mobile threats are evolving rapidly around the world. Threat Intelligence gives you access to the world's largest database of mobile threats.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through September 30, 2017

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Events

Archived Events

Resources

Lookout Mobile Endpoint Security is a mobile security solution that provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.With a seamless integration to your enterprise m...

Many organizations are now embracing the use of smartphones and tablets to increase productivity in the workplace, and as more sensitive data goes mobile, your organization's security policies must extend to your mobile endpoint devices. Lookout Mobile Endpoint Security makes it easy to get visibili...

A look into the Mobile Threat Landscape.

The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints.

lookout-banner-logo-R2.gif
Resource
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.

Your data is now mobile and out of your control. New research is changing the way CISOs perceive the risks to critical data from the mobile ecosystem — and how they should secure it. Get visibility into the full spectrum of mobile risk to protect intellectual property and increase productivity...

Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps.Read the four mobile securit...

lookout-banner-logo-R2.gif
Datasheet
Organizations are increasingly adopting formal mobility programs to empower mobile productivity. As data is becoming more mobile, coupling an enterprise mobility management solution with a cloud-based, mobile security solution provides the defensive layers needed to protect your enterprise data.