2016 was the year mobile risk reduction became a necessity for global enterprises. Controlling mobile access to corporate data is now a top priority and proactive CISOs are selecting Lookout to accelerate secure mobility in the workplace.
This increase in customer orders drove Lookout to triple our billings year over year in 2016 compared to 2015 for Mobile Endpoint Security. To date, more than 150 enterprises, including top financial services institutions, technology leaders, healthcare providers, professional services firms, and large government agencies, are using Lookout Mobile Endpoint Security. Lookout also more than tripled the number of channel partnerships year over year, and we’re now working with over 80 distributors globally, including new partnerships with Carahsoft, Docomo, Ingram Micro, CDW, SHI, Synergie, and Netrix.
Today, Lookout is adding two new tools to our Personal app for individuals who are concerned about the safety of their digital identity and financial data.
In today’s mobile world our personal information is stored in many services on our devices and across the internet, which is a great thing for our daily digital lives. Criminals see value in this information, too, especially if it’s information associated with our identities, and may attempt to breach the services we use to obtain it.
Identity Theft Protection helps you detect and recover from identity theft, and Breach Report notifies you with clear, actionable information about corporate data breaches that may impact you. These new features, coupled with our time-tested security technology, make the Lookout Personal app the only all-in-one app for mobile security, identity theft protection, and device theft prevention.
To the people whose data, devices, and digital lives we protect every day:
Lookout has just released a brand new design for the Lookout app for Android, all based on your feedback.
We recently completed a comprehensive customer-insights initiative with you, our users. In it, we learned that you need:
Strong protection from the real threats to your devices and data
Timely and easy-to-understand information about active threats
Peace of mind that your mobile security app protects you automatically
Knowledge and education that empowers you
“The goal of this redesign was to empower users with clear, straightforward, and actionable information about their device and data, all the while providing them peace of mind knowing that Lookout is always watching out for them.” – Sachin Kansal, vice president of consumer product, Lookout
This means that while enterprise employees more seriously consider mobile devices to be an invaluable tool in their everyday working lives, enterprise IT teams don’t have to struggle to secure the rapidly increasing number of endpoints on their networks.
On Tuesday, I had the great pleasure to speak at the U.S. Chamber of Commerce’s 5th Annual Cybersecurity Summit. This premiere event convenes public and private sector leaders around one of our most pressing national security concerns. My presentation focused on how U.S. Government CIOs and security professionals can secure the next frontier for cyber attacks: the mobile device.
Today we are excited to announce the availability of network protection, an automated on-device analysis of network connections that defends against man-in-the-middle (MitM) attacks and ensures information is being securely transmitted.
With every enterprise now shifting towards a mobile-first, cloud-first workplace, employees’ day-to-day work now happens beyond the traditional enterprise perimeter.
The enterprise security risks from man-in-the-middle attacks
Many enterprises encrypt sensitive corporate data on mobile devices, but attackers can intercept and decrypt this data via man-in-the-middle attacks using equipment that costs less than $100.
Data in transit on mobile devices is an unmitigated security risk for many organizations. Employees tend to freely connect to public Wi-Fi networks on their smartphones and tablets, not thinking twice about installing proxies to gain access. Unfortunately, they are also largely unaware this can enable attackers to decrypt all encrypted traffic streams going to and from their devices.
Why Lookout network protection is better
Lookout network protection is the most actionable defense against MitM attacks because it focuses on the risks that are the most relevant to enterprises, namely, attempts to intercept encrypted data in transit.
The Lookout endpoint app automatically detects when a device connects to a new network (Wi-Fi, cellular, VPN, tethered) and immediately runs a series of health checks on that new network to ensure that it is behaving properly. Examples of checks performed include determining that the Root Certificate Authority used to issue SSL certificates for HTTPS sites matches expected values and that the cipher suites and TLS versions used are strong.
Why Lookout network protection delivers better protection from MitM attacks:
Automatic detection — Whenever a device connects to a new network, the on-device Lookout app automatically checks reference servers with known certificate properties and a known TLS configuration. This allows us to compare expected network configuration properties with the established network properties we see. By analyzing whether these established connections meet expected properties, we can determine whether connections are being tampered with by utilizing any of the methods described above (Host certificate hijacking, TLS downgrade, and others).
Reduced false positives — Most progressive mobility programs do not restrict an employee’s ability to connect to cafe, hotel, or airport Wi-Fi networks as that would hinder productivity. However, some approaches to MitM detection will surface admin alerts for this everyday activity. These approaches lead to an abundance of false positives that are not actionable by the average IT organization.
The Lookout approach focuses on the risky types of connections that put encrypted data at risk and thus are not reasonable for employee use. By having an endpoint agent on the device, we are able to introduce a lightweight solution to the user that doesn’t require a VPN to analyze network traffic. This minimizes false positives, enabling users to stay connected and productive on the go.
Remediation — If a new network connection is deemed unsafe, Lookout will alert the employee, letting them know of the threat and that they should disconnect from the Wi-Fi network or uninstall the configuration profile.
Lookout is also able to apply automated remediation via Mobile Device Management solutions during a MitM attack, if a secure connection is present.
Network protection is the latest security layer within Lookout Mobile Threat Protection, and is now available through over 58 global value-added resellers and distributors, and represents continued commitment by Lookout to delivering superior mobile security to large enterprises.
“Lookout shares our belief that mobility should empower employees, not restrict them. Companies should be harnessing the power of the intelligent cloud and mobile threat data to limit their exposure to potential security breaches. We are excited to be working closely together with Lookout to integrate these new capabilities with EMS.”
– Brad Anderson, corporate vice president for Microsoft’s Enterprise Client & Mobility Group
Why security is a critical component to enterprise mobility
Working without a mobile device is not an option anymore. Mobile is the way business is done. People travel and check their email. They access sensitive data via their devices. They collaborate with coworkers in real-time. A Gallup poll shows that 72% of Americans check their devices at least hourly, with 52% checking their devices a few times time an hour or more.
The rising use of mobile devices combined with the rising prevalence of sophisticated threats against mobile apps, networks, and devices adds up to one clear conclusion: it’s vital that enterprises get ahead of their mobile risks, and now is the time to get mobile security right. Lookout is partnering with Microsoft to enhance enterprise mobile security and enable enterprises to accelerate their digital transformation.
The best mobility. The best mobile security.
Our joint goal is to make enterprise IT and security leaders’ lives easier. “Security” is elusive because it seems as soon as one hole is plugged, there’s another right around the corner. Fortunately, mobile devices don’t need to be another task on the IT-security to-do list. The Microsoft and Lookout integration will give business customers peace of mind: employees will benefit from the freedom and flexibility of mobile productivity, and mobility teams will get the comfort of knowing those devices are comprehensively secure.
What we’re building
Lookout’s solution is lightweight and built with mobile in mind, a perfect complement to Microsoft’s mobility suite. Together, we’ll deliver benefit to both IT security teams and employees themselves.
When mobile threats are detected, the integration between Lookout and Microsoft’s Enterprise Mobility Suite will give IT and security teams the ability to take action — protecting data across users’ devices, and applications. Teams will also be able to use threat intelligence from Lookout to set policies. This helps everyone manage and secure access to cloud and on-premise applications, as well as to selectively wipe corporate data from devices.
Employees will benefit from the same peace of mind knowing that their devices — which are never perfectly segregated between work and personal use — are safe from growing mobile threats.
Microsoft and Lookout have partnered to help companies stay more secure in this world of mobility and cloud, learn more below.
This year at CeBIT, Lookout will be on the center stage, with Lookout’s CTO and co-founder, Kevin Mahaffey, sharing his talk, “Why I hacked Tesla and what it means for your business.” According to Mahaffey, what started as a car hack, turned into an investigation revealing many of the same challenges we see with traditional enterprise security. For example, how do you build a resilient and flexible perimeter in today’s mobile world? How do you get security updates systems working swiftly from day one?
Keynote: Thursday March 17th at 3:15 – 3:45 Hall 8, Center Stage
CeBIT is one of the largest IT trade events in the world, and is happening in Hannover Germany this week. At the event, we’ll be sharing news of our expansion into Germany, including many local partners and distributors. Check out the Lookout display at our partner, Mobile Iron’s booth (Hall 4, Stand A24). Please come visit it to say hello, or hallo.