November 5, 2019

-
min read

Continuous Conditional Access for Office 365

In a well-attended session at Microsoft ignite yesterday, Brad Anderson, Corporate Vice President, Microsoft Corp, demoed Lookout Continuous Conditional Access for Office 365. With the increased shift towards using BYOD devices, organizations are moving towards managing applications rather than managing and taking control of the entire device. The session, “Modern management: How/why you do it now,” showed Lookout informing Microsoft Endpoint Management, formerly Intune, if an iOS or Android device risk level exceeded those set by the admin. The Microsoft Endpoint Management admin can then apply application protection policies in the Client Apps section of the Azure Portal, such as blocking access to corporate data, until the device is brought back into compliance. Admins can also use device risk-based evaluation on unmanaged devices with Lookout to block any of the Intune-protected apps, like Outlook, from opening until the user’s device is brought back into compliance. Brad closed out the demo highlighting strong interest in this capability by saying: “I know that there are millions of devices waiting for this to be released.”

Watch Brad’s demo to learn more about Lookout Continuous Conditional Access for Office 365:

Lookout @ Ignite: Brad Anderson Modern Management Session from Lookout, Inc. on Vimeo.

Lookout is at Microsoft Ignite 2019, taking place in Orlando this week! Visit us at booth #1606 to learn more about our new integration with Microsoft.                    

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.