March 16, 2018

-
min read

Forrester’s Now Tech Mobile Security Report

To achieve comprehensive security, enterprises must choose solutions that complement their existing security ecosystem. Forrester's new Now Tech Mobile Security report reinforces this fact.

The report outlines the top twenty mobile security providers in Q1 2018 based on revenue, focus, and technological capability. It further divides the vendors into three distinct functionality segments:

  • Mobile security specialists, such as mobile threat defense vendors
  • Device security suites, such as endpoint protection vendors
  • Enterprise mobility management platforms

The main takeaway: A truly comprehensive mobile security strategy employs some combination of all three.

An ecosystem of partners

At Lookout, we've been rigorously focused on a mobile-first approach to security since our inception. As a part of this strategy, we know the importance of partnering with other vendors who are leaders in their space and providing a product that easily integrates with existing management and security solutions. For example, by integrating Lookout Mobile Endpoint Security with Microsoft Enterprise Mobility + Security (EMS), we've been able to create a comprehensive mobile security strategy that takes advantage of the best Microsoft and Lookout has to offer. Lookout is also partnered with VMWare, MobileIron, and others.

We think these integrations are vital to ensure that customers are getting the best solution, without having to juggle multiple vendors who do not talk to one another.

The "Mobile Risk API"

To further ensure customers are able to protect their mobile devices against threats (mobile threat defense), are managed well (enterprise mobility management), and integrate their mobile security solutions with their fixed-endpoint security (endpoint protection), we created the Mobile Risk API. Though this, any enterprise can connect Lookout Mobile Endpoint Security to their existing or future management and endpoint protection solutions.

Take Microsoft Windows Defender Advanced Threat Protection (WDATP) for example. Lookout integrated with WDATP using our robust API strategy. With this, a customer's WDATP Windows device view is extended to include protection against mobile threats. Mobile threat information is integrated into the WDATP operator and analytics dashboards, as well as the "alerts" and "machine" screens, for a single pane of glass experience for security professionals. This brings the enterprise a more holistic view across fixed and mobile devices.  

Enterprises need vendors that play together well

The Forrester report highlights upwards of 20 different vendors, offering multiple types of technologies to help combat the issue of data compromise and leakage on mobile devices. Enterprises should use solutions that are easily integrated with existing security infrastructure. Fixed endpoint protection and enterprise mobility management cannot provide the mobile security they need, but with Lookout and its integrations and API enterprises can deploy a full solution. The future of the enterprise is mobile. The degree to which an organization can successfully make the transition to full mobility will largely depend on decisions that are made now - decisions that impact employee and customer security, sensitive data, and revenue-generating operations.

Want to learn more about the mobile security industry? Read the Forrester report.

Want to find out how Lookout can protect your enterprise? Contact us today.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.