Welcome!

News Feed Item

Lookout Expands Mobile Endpoint Security Solution to Enhance Productivity Across iOS Enterprises

Introduces enterprise app review to enable iOS-centric enterprises building their own custom apps to rapidly analyze for data policy compliance and security risks

SAN FRANCISCO, March 20, 2017 /PRNewswire/ -- Lookout, the global leader in securing mobility, has expanded its enterprise security solution, Lookout Mobile Endpoint Security, to address the most pressing needs of iOS-centric organizations and accelerate the adoption of secure mobility.

Lookout and Apple understand mobile is transforming the way business is done, and as mobile productivity increases, enterprises are developing their own apps to take advantage of this transformation. As a new Apple mobility partner, Lookout is introducing enterprise app review to enable enterprises building their own iOS apps to rapidly analyze them for data policy compliance and security risks. With enterprise app review, custom iOS apps are uploaded into the Lookout Security Cloud for correlation against a 40-million-app database to uncover anomalies before distribution via internal app stores.

Many enterprises have unique compliance policies that specify how corporate data should be stored and transmitted, including while in use on mobile devices and in apps. Some mobile apps or public Wi-Fi networks compromise company or industry policies. For example, enterprise apps developed by third parties and distributed through internal app stores may lack sufficient encryption to protect customer or patient data.     

"Enterprises must be confident that their data is secure while employees are working anywhere in the world," said Santosh Krishnan, Lookout chief product officer. "This new functionality is addressing mobile compliance as part of our collective mission to help organizations seamlessly embrace mobile productivity in the workplace."

In addition to reviewing custom apps, Lookout Mobile Endpoint Security can also review apps downloaded from the App Store. While vetted and approved through Apple's stringent App Store approval process, some apps may automatically send contact or location information to an external server which may directly contradict corporate policy. Plus, with the rise of mobile productivity on the go, employees are frequently connecting to public Wi-Fi networks which could expose corporate data in transit. 

Lookout Mobile Endpoint Security extends the built-in security of the iOS platform by leveraging the Lookout Security Cloud to provide enterprises with visibility and protection across network threats and suspicious behaviors for apps that are built in-house and distributed via MDM for iOS. Lookout customers will be able to:

  • Identify risk within in-house built apps: As enterprises develop apps to create mobile workflows that improve productivity among employees or customers, developers will be able to quickly submit apps for review. This review provides immediate data on non-compliant app behaviors, malware, and code vulnerabilities, while also providing visibility into whether an app has unsanctioned or private APIs written into its code.
  • Enable employees to work safely on the go: Lookout secures employee devices and data through an automatic on-device analysis of network connections to defend against attacks and ensure information is being securely transmitted.
  • Take steps towards reaching compliance on mobile: Enterprises now have visibility into apps installed within their employee base that may be out of compliance with corporate security policies and/or industry regulations. Exclusively for iOS, enterprises can see which apps connect to cloud services and those that could potentially violate corporate data policy, such as sharing contact and location information. Lookout will also provide enterprises with insights into whether iOS apps are taking advantage of the newest security features in iOS.

Lookout Mobile Endpoint Security is sold through Lookout's Channel Partner Program. For iOS-specific enterprise employees, the Lookout app can be downloaded from the App Store. To learn more about Lookout Mobile Endpoint Security visit www.lookout.com.

About Lookout

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world's leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit www.lookout.com, subscribe to the Lookout blog, and follow Lookout on Facebook, Twitter and LinkedIn.

 

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/lookout-expands-mobile-endpoint-security-solution-to-enhance-productivity-across-ios-enterprises-300426073.html

SOURCE Lookout

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transi...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...