Lookout News

March 15, 2017

Securing enterprise mobility is driving record growth at Lookout

2016 was the year mobile risk reduction became a necessity for global enterprises. Controlling mobile access to corporate data is now a top priority and proactive CISOs are selecting Lookout to accelerate secure mobility in the workplace.

This increase in customer orders drove Lookout to triple our billings year over year in 2016 compared to 2015 for Mobile Endpoint Security. To date, more than 150 enterprises, including top financial services institutions, technology leaders, healthcare providers, professional services firms, and large government agencies, are using Lookout Mobile Endpoint Security. Lookout also more than tripled the number of channel partnerships year over year, and we’re now working with over 80 distributors globally, including new partnerships with Carahsoft, Docomo, Ingram Micro, CDW, SHI, Synergie, and Netrix.

November 15, 2016

Secure your identity and your device in one app with expanded protection from Lookout Personal

Today, Lookout is adding two new tools to our Personal app for individuals who are concerned about the safety of their digital identity and financial data.

In today’s mobile world our personal information is stored in many services on our devices and across the internet, which is a great thing for our daily digital lives. Criminals see value in this information, too, especially if it’s information associated with our identities, and may attempt to breach the services we use to obtain it.

Identity Theft Protection helps you detect and recover from identity theft, and Breach Report notifies you with clear, actionable information about corporate data breaches that may impact you. These new features, coupled with our time-tested security technology, make the Lookout Personal app the only all-in-one app for mobile security, identity theft protection, and device theft prevention.

Want to check it out?

Screen Shot 2016-11-14 at 11.50.47 AM

October 28, 2016

A new look for Lookout, designed by you

blog-hero

To the people whose data, devices, and digital lives we protect every day:

Lookout has just released a brand new design for the Lookout app for Android, all based on your feedback.

We recently completed a comprehensive customer-insights initiative with you, our users. In it, we learned that you need:

  • Strong protection from the real threats to your devices and data
  • Timely and easy-to-understand information about active threats
  • Peace of mind that your mobile security app protects you automatically
  • Knowledge and education that empowers you
screen-shot-2016-10-12-at-1-20-06-pm“The goal of this redesign was to empower users with clear, straightforward, and actionable information about their device and data, all the while providing them peace of mind knowing that Lookout is always watching out for them.” – Sachin Kansal, vice president of consumer product, Lookout
October 4, 2016

Microsoft and Lookout: Securing all your endpoints begins today

screen-shot-2016-10-04-at-9-24-38-am

Today, we are excited to announce that the Lookout Mobile Endpoint Security integration with Microsoft Enterprise Mobility + Security (EMS) is now generally available.

This means that while enterprise employees more seriously consider mobile devices to be an invaluable tool in their everyday working lives, enterprise IT teams don’t have to struggle to secure the rapidly increasing number of endpoints on their networks.

September 29, 2016

Here’s what I told the U.S. Chamber of Commerce about mobile security

img_7516

On Tuesday, I had the great pleasure to speak at the U.S. Chamber of Commerce’s 5th Annual Cybersecurity Summit. This premiere event convenes public and private sector leaders around one of our most pressing national security concerns. My presentation focused on how U.S. Government CIOs and security professionals can secure the next frontier for cyber attacks: the mobile device.

August 17, 2016

Gartner Market Guide for Mobile Threat Defense Solutions – what you need to know

gartner-market-guide-bl-2x

Gartner published its “Market Guide for Mobile Threat Defense Solutions” a few weeks ago, and in my view it offers three key takeaways for security and IT leaders facing the challenge of securing mobility in your organizations.

In the guide, Gartner establishes a clear definition for Mobile Threat Defense (MTD), outlines the market’s direction through 2018, and provides the capabilities an MTD solution should have.

Let’s take a closer look at what I see as the “must know” takeaways from this report:

June 21, 2016

Introducing network protection for mobile man-in-the-middle attacks

Screen Shot 2016-06-15 at 1.52.16 PM

Today we are excited to announce the availability of network protection, an automated on-device analysis of network connections that defends against man-in-the-middle (MitM) attacks and ensures information is being securely transmitted.

With every enterprise now shifting towards a mobile-first, cloud-first workplace, employees’ day-to-day work now happens beyond the traditional enterprise perimeter.

The enterprise security risks from man-in-the-middle attacks

Many enterprises encrypt sensitive corporate data on mobile devices, but attackers can intercept and decrypt this data via man-in-the-middle attacks using equipment that costs less than $100.

Data in transit on mobile devices is an unmitigated security risk for many organizations. Employees tend to freely connect to public Wi-Fi networks on their smartphones and tablets, not thinking twice about installing proxies to gain access. Unfortunately, they are also largely unaware this can enable attackers to decrypt all encrypted traffic streams going to and from their devices.

Why Lookout network protection is better

Lookout network protection is the most actionable defense against MitM attacks because it focuses on the risks that are the most relevant to enterprises, namely, attempts to intercept encrypted data in transit.

Screen Shot 2016-06-20 at 1.04.34 PM

The Lookout endpoint app automatically detects when a device connects to a new network (Wi-Fi, cellular, VPN, tethered) and immediately runs a series of health checks on that new network to ensure that it is behaving properly. Examples of checks performed include determining that the Root Certificate Authority used to issue SSL certificates for HTTPS sites matches expected values and that the cipher suites and TLS versions used are strong.

Why Lookout network protection delivers better protection from MitM attacks:

Automatic detectionWhenever a device connects to a new network, the on-device Lookout app automatically checks reference servers with known certificate properties and a known TLS configuration. This allows us to compare expected network configuration properties with the established network properties we see. By analyzing whether these established connections meet expected properties, we can determine whether connections are being tampered with by utilizing any of the methods described above (Host certificate hijacking, TLS downgrade, and others).

Reduced false positivesMost progressive mobility programs do not restrict an employee’s ability to connect to cafe, hotel, or airport Wi-Fi networks as that would hinder productivity. However, some approaches to MitM detection will surface admin alerts for this everyday activity. These approaches lead to an abundance of false positives that are not actionable by the average IT organization.

The Lookout approach focuses on the risky types of connections that put encrypted data at risk and thus are not reasonable for employee use. By having an endpoint agent on the device, we are able to introduce a lightweight solution to the user that doesn’t require a VPN to analyze network traffic. This minimizes false positives, enabling users to stay connected and productive on the go.

RemediationIf a new network connection is deemed unsafe, Lookout will alert the employee, letting them know of the threat and that they should disconnect from the Wi-Fi network or uninstall the configuration profile.

Lookout is also able to apply automated remediation via Mobile Device Management solutions during a MitM attack, if a secure connection is present.

How to learn more about the risks of MitM

To learn more about the real risks of employees regularly connecting to hotel and coffee shop Wi-Fi networks and to see a live MitM attack demonstration attend the upcoming webinar, Understanding Mobile Man-In-The-Middle Attacks and the Enterprise Security Risks.

Network protection is the latest security layer within Lookout Mobile Threat Protection, and is now available through over 58 global value-added resellers and distributors, and represents continued commitment by Lookout to delivering superior mobile security to large enterprises.

June 7, 2016

Lookout and Microsoft: securing enterprise mobility together

logos

Today, Lookout and Microsoft announced a new partnership that will integrate Lookout Mobile Threat Protection with the Microsoft Enterprise Mobility Suite. Together, we’re improving how enterprises protect and manage the sensitive data that employees access through their mobile devices every day.

“Lookout shares our belief that mobility should empower employees, not restrict them. Companies should be harnessing the power of the intelligent cloud and mobile threat data to limit their exposure to potential security breaches. We are excited to be working closely together with Lookout to integrate these new capabilities with EMS.”
– Brad Anderson, corporate vice president for Microsoft’s Enterprise Client & Mobility Group
Screen Shot 2016-05-26 at 2.41.32 PM
Why security is a critical component to enterprise mobility

Working without a mobile device is not an option anymore. Mobile is the way business is done. People travel and check their email. They access sensitive data via their devices. They collaborate with coworkers in real-time. A Gallup poll shows that 72% of Americans check their devices at least hourly, with 52% checking their devices a few times time an hour or more.

The rising use of mobile devices combined with the rising prevalence of sophisticated threats against mobile apps, networks, and devices adds up to one clear conclusion: it’s vital that enterprises get ahead of their mobile risks, and now is the time to get mobile security right. Lookout is partnering with Microsoft to enhance enterprise mobile security and enable enterprises to accelerate their digital transformation.

The best mobility. The best mobile security.

Our joint goal is to make enterprise IT and security leaders’ lives easier. “Security” is elusive because it seems as soon as one hole is plugged, there’s another right around the corner. Fortunately, mobile devices don’t need to be another task on the IT-security to-do list. The Microsoft and Lookout integration will give business customers peace of mind: employees will benefit from the freedom and flexibility of mobile productivity, and mobility teams will get the comfort of knowing those devices are comprehensively secure.

What we’re building

Lookout’s solution is lightweight and built with mobile in mind, a perfect complement to Microsoft’s mobility suite. Together, we’ll deliver benefit to both IT security teams and employees themselves.

When mobile threats are detected, the integration between Lookout and Microsoft’s Enterprise Mobility Suite will give IT and security teams the ability to take action — protecting data across users’ devices, and applications. Teams will also be able to use threat intelligence from Lookout to set policies. This helps everyone manage and secure access to cloud and on-premise applications, as well as to selectively wipe corporate data from devices.

Employees will benefit from the same peace of mind knowing that their devices — which are never perfectly segregated between work and personal use — are safe from growing mobile threats.

Microsoft and Lookout have partnered to help companies stay more secure in this world of mobility and cloud, learn more below.

Screen Shot 2016-05-26 at 5.14.26 PM

April 17, 2016

Can a phone be hacked? Watch Lookout on 60 Minutes

Screen Shot 2016-04-17 at 5.34.59 PM

Interested in getting more in-depth information on our attack demonstrations? Read about how we did the Wi-Fi attack here and the mobile malware attack here

Tonight, 60 Minutes featured Lookout co-founder John Hering and a number of other well-known and respected security researchers demonstrating mobile attacks.

March 14, 2016

CeBIT 2016: What hacking cars has to do with your business

image2

This year at CeBIT, Lookout will be on the center stage, with Lookout’s CTO and co-founder, Kevin Mahaffey, sharing his talk, “Why I hacked Tesla and what it means for your business.” According to Mahaffey, what started as a car hack, turned into an investigation revealing many of the same challenges we see with traditional enterprise security. For example, how do you build a resilient and flexible perimeter in today’s mobile world? How do you get security updates systems working swiftly from day one?

Keynote: Thursday March 17th at 3:15 – 3:45 Hall 8, Center Stage

CeBIT is one of the largest IT trade events in the world, and is happening in Hannover Germany this week. At the event, we’ll be sharing news of our expansion into Germany, including many local partners and distributors. Check out the Lookout display at our partner, Mobile Iron’s booth (Hall 4, Stand A24). Please come visit it to say hello, or hallo.

If you can’t join the event in-person, you can also watch Kevin’s keynote from this live stream: http://webcast.nc3-cdn.com/clients/dmag/cgc2016/stage1/