Lookout

Mobile phishing is the biggest unsolved problem in cybersecurity
lookout_800

<h3 style=”text-align: center;”><span style=”color: #000000;”>The Solution to Your Mobile Security</span></h3>

Learn more about Lookout Security Platform

Scarica il White Paper

<p style=”text-align: justify;”><span style=”color: #ffffff;”>The Mobile Risk Matrix: explore the 12 elements every CISO must know</span></p>

Scopri di Più

<p style=”text-align: justify;”><span style=”color: #ffffff;”>Discover your mobile risk by taking this 2-minute survey</span></p>

Vai alla tua MRA

On-Demand Webinar: The Evolution of Mobile Threat Actors

Join Michael Flossman, Head of Threat Intelligence at Lookout, for an insider discussion of today’s evolving mobile threat landscape and how to proactively secure your enterprise.

Guarda Ora!
idc-marketscape-logo-210x40

“Lookout is positioned as a  leader in this IDC MarketScape for the MDM security software market*”

*IDC MarketScape: Worldwide Mobile Threat Management Security Software 2017

Leggi Ora!

Mobile security is a big data problem

With over 150M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities. Now CISOs can confidently protect their enterprise with a mobile security solution based on real-world data that delivers.

HP-1

One platform with a portfolio of protection

The Lookout Security Cloud leverages a data-driven approach to detect complex patterns that indicate known and novel threats, software vulnerabilities, and risky mobile behaviors and configurations. Find out how your organization can best leverage Lookout’s platform by exploring our products below.

why-lookout-graphic-2018

What makes Lookout different?

Lookout-sensor-network

Un'enorme Rete Globale di Sensori

Il successo dei prodotti Lookout per la protezione degli endpoint personali e aziendali ha consentito ad Lookout di avere visibilità su oltre 150 milioni di dispositivi mobili nel mondo. Ogni mese milioni di dispositivi in più di 150 paesi mandano informazioni di sicurezza ad Lookout Security Cloud, permettendo a Lookout di tracciare i vettori di minaccia in evoluzione e continuare a rilevare nuove minacce come lo spyware Pegasus.

Lookout-3

Complete Funzionalità di Sicurezza

Un'unica piattaforma, Lookout Security Cloud, è alla base di un'ampia gamma di prodotti e servizi Lookout. La piattaforma di Lookout offre l'insieme approfondito e comprensivo di funzionalità per la sicurezza mobile, da mobile threat defense (MTD), mobile app reputation service (MARS), mobile threat intelligence e molto altro. Come leader innovativo, Lookout possiede oltre 110 brevetti relativi alle tecnologie di sicurezza mobile.

Lookout-mobile-database

Un Dataset Mobile Industry-Leading

Il dataset mobile di Lookout ci garantisce il vantaggio di poter utilizzare precisione e contesto. Permette di comprendere se un segnale o una caratteristica di una potenziale minaccia è normale, raro o veramente anomalo, in tutto il mondo. Lookout ha acquisito ed analizzato oltre 50 milioni di applicazioni mobile, per esempio, e tracciare la loro diffuzione in tempo reale attraverso la rete globale di sensori.

Lookout-cloud-first

Un Approccio Cloud-First, Device-Assisted

Al fine di creare un approccio più sicuro e robusto per proteggere gli endpoint mobili, Lookout ha progettato la sua piattaforma specificamente per dare priorità alle analisi in cloud rispetto alle tecniche di analisi sul dispositivo, intrinsecamente meno sicure perché gli attaccanti possono controllarle ed evitarle, e possono inoltre avere un impatto negativo sulle prestazioni del dispositivov e sulla durata della batteria.

Comprehensive protection across the spectrum of mobile risk.

why-lookout-graphic2
Mobile Threats

The need for organizations to have mobile threat defense in place has never been more clear given the sophisticated string of attacks seen recently on both Android and iOS devices, perpetrated both by private organizations and nation states.

Mobile Software Vulnerabilities

Software vulnerabilities can exist across all layers of the mobile environment and they raise the risk that critical mobile software and hardware can be exploited by attackers to steal data and attack organizations.

Mobile Behavior and Configurations

Outside of mobile threats and software vulnerabilities, a wide range of mobile environment configurations and behaviors, such as app data leakage, can nonetheless elevate an organization’s risk profile.

Lookout Mobile Endpoint Security mitigates risk for Your organization

MES_mainproducthero_1280x680

AS YOUR DATA GOES MOBILE, LOOKOUT CLOSES YOUR SECURITY GAP

Many organizations are now embracing the use of smartphones and tablets to increase productivity in the workplace, and as more sensitive data goes mobile, your organization’s security policies must extend to your mobile endpoint devices. Lookout Mobile Endpoint Security makes it easy to get visibility into the entire spectrum of mobile risk, apply policies to measurably reduce that risk, and integrate into your existing security and mobile management solutions.

The success of Lookout’s personal and enterprise mobile endpoint products has given us visibility into over 150 million mobile devices worldwide. This unparalleled visibility into mobile apps, networks, and OS firmware allows us to implement machine learning to detect emerging threats with high fidelity.

Lookout Mobile Endpoint Security delivers

MES-844x474_App

Protection from app-based risks

Apps are the predominant way that sensitive data is accessed on mobile devices, with risks spanning across both iOS and Android. Lookout’s app analysis technology is powered by intelligence from over 50 million iOS and Android apps, giving you visibility into app-based risks such as:

target_sm
Trojans e spyware che possono sottrarre dati dal dispositivo

target_sm
Vulnerabilità nel trasferimento e storage dei dati da un'app

target_sm
Comportamenti anomali di un'app che mettono a rischio la compliance

target_sm
Sideloaded apps che bypassano gli app store ufficiali

Protection from web and content threats

Phishing is the most common way attackers lure users to malicious websites to deliver drive-by downloads or inject code onto a device. The mobile device opens up new routes attackers can use to gain access to users’ credentials beyond corporate email.

Lookout alerts users to phishing attempts from any source on a mobile device including:

target_sm
Email di phishing sugli account personali o aziendali

target_sm
Messaggi di testo con link abbreviati verso siti web malevoli

target_sm
App contenenti URL da cui scaricare plug-in dannosi

target_sm
App,contenenti URL che scaricano plug-in malevoli

MES-Devices-844x474_FINAL
MES-844x474_Device

Protection from device-based risks

If the device is compromised with software vulnerabilities, the built-in security of the operating system can be bypassed. Lookout creates a fingerprint of each mobile device and compares it against the 150 million devices in our security platform to identify anomalies and risks, such as:

target_sm
Anomalie comportamentali

target_sm
Root o jailbreak avanzati

target_sm
Sistemi operativi non aggiornati

target_sm
Rischi inerenti la configurazione del dispositivo

Protection from network-based risks

Often taking the form of a man-in-the-middle attack, these network threats are typically executed by spoofing a Wi-Fi hotspot to intercept network traffic and decrypt sensitive data. By analyzing network connections from our global sensor network, we effectively mitigate false positives while detecting high impact threats, including:

target_sm
Attacchi man-in-the-middle

target_sm
Hijacking dei certificati

target_sm
Attacchi SSLStrip

target_sm
Degradamento dei protocolli TLS

MES-844x474_Network
Scarica il Datasheet

Request a demo and see what Lookout can do for your mobile security!