Lookout OverviewUNIXBusinessApplication

Lookout is the #3 ranked solution in top Mobile Threat Defense tools, #5 ranked solution in top ZTNA tools, #6 ranked solution in top Mobile Data Protection tools, #10 ranked solution in CASB solutions, #13 ranked solution in top ZTNA services, #15 ranked solution in top Threat Intelligence Platforms, #17 ranked solution in top Secure Access Service Edge (SASE) tools, #23 ranked solution in top Web Security Gateways, and #29 ranked solution in EDR tools. PeerSpot users give Lookout an average rating of 8.0 out of 10. Lookout is most commonly compared to McAfee MVISION Mobile: Lookout vs McAfee MVISION Mobile. Lookout is popular among the large enterprise segment, accounting for 61% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 23% of all views.
Buyer's Guide

Download the Cloud Access Security Brokers (CASB) Buyer's Guide including reviews and more. Updated: December 2022

What is Lookout?

Lookout is a well-established and powerful secure web gateway (SWG) solution that protects more than 200 million users from threats that can result from the penetration of unsecured web traffic into their networks. Lookout is designed to enable organizations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using to run their organization’s network. 

Users of Lookout are able to proactively detect threats and keep themselves secure from a field of threats that constantly evolves. IT teams can protect their organizations without having to rely on any other security solutions. This singular solution can run on multiple kinds of mobile devices. The privacy of individuals is preserved while keeping compliance rules intact. Additionally, users gain access to a number of tools that enable them to prevent security breaches from taking place.

Lookout Benefits

Some of the ways that organizations can benefit by deploying Lookout include:

  • Ease of deployment. Lookout is a solution whose design makes it easy for users to deploy it. It provides users with simple, step-by-step instructions that remove the need for organizations to devote extensive amounts of time to make sure that it is properly set up. Anyone can quickly set up the solution without undergoing technical training. 
  • Built-in support. Users of the Lookout application have access to built-in demos that can teach them how to use various solution features. Instead of spending time trying to figure out the application, users can watch the demo that is most relevant to them and see for themselves how that particular feature is used.
  • Easy-to-use user interface. Lookout’s user interface is laid out in an intuitive way that makes it easy for administrators to navigate. This interface is present in both the mobile and desktop versions of this solution. 
  • Settings customization. Lookout has a built-in settings customization menu. This makes it possible for administrators to easily customize their settings so that they best conform to their needs. 

Lookout Features

  • Activity monitoring and activity tracking. Lookout’s activity monitoring and activity tracking capabilities enable users to keep a close eye on the activities that are taking place in their networks. IT teams and administrators have the ability to watch their networks for any unusual activity. These features ensure that organizations can keep ahead of any potential threats. They provide the kinds of insights and warnings that make the jobs of those IT teams and administrators much easier and more streamlined. 
  • Encryption. Organizations that employ Lookout can encrypt their networks and keep crucial business data from being read by unauthorized parties. This feature keeps the secrets organizations are trying to keep out of the wrong hands.
  • Anti-virus tools. Lookout provides users with tools to block threats from harming their networks. These tools can successfully block 99.6 percent of threats without raising false alarms. 
Lookout Customers


Lookout Pricing Advice

What users are saying about Lookout pricing:
"The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."

Lookout Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Director Endpoint Security at a financial services firm with 10,001+ employees
Real User
Top 20
Allows users to self-remediate security issues, maintaining their privacy and providing excellent vulnerability detection
Pros and Cons
  • "The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
  • "We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."

What is our primary use case?

Our primary use case is to secure our corporate and bring-your-own mobile devices to prevent malware threats. The solution is a secure tool to protect against rogue attacks, threats, vulnerabilities, malware, rootkit applications etc. We have the SaaS instance of Lookout, so we don't have anything on-prem. 

How has it helped my organization?

Lookout MES is essential to our organization's endpoint security; we require a security stack on all our assets, whether Windows 10, Linux, Mac, or cloud workloads. Mobile is another endpoint we need to protect, and Lookout is the tool we use to protect our mobile devices, corporate and personal.

The solution frees up time for some of our IT and security staff, allowing them to focus on other tasks and projects. We spend less time looking after our mobile security and running manual reports and different company controls. We use our APIs for MDM connected to Lookout to build dashboards, which allows us to be transparent and see the baseline security for our mobile devices, and which ones have the highest vulnerability. The tool helps us with compliance, so all these elements free up time.  

Lookout reduced our security and IT overhead costs as we have fewer full-time employees working on producing dashboards. Previously, our staff also had to run manual reports and compile them for a clear security picture, but we no longer require the same amount of staff taking care of mobile devices in the backend.  

The product reduced the risk to our organization's data, which was our number one priority when looking for a solution. We need to reduce the risk to our mobile devices and, by extension, the data and clients on them, which is why we chose Lookout.

What is most valuable?

The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade.

Lookout is excellent for helping end users self-remediate security issues; we have a good relationship with the vendor, we have regular meetings, and they send us communications regarding critical vulnerabilities and what we can do on our backend to protect our organization. They offer guidance on communicating with our users because, ultimately, the users must carry out the malware cleanup due to privacy; it's not automatic. So we have a good partnership with the vendor; we developed a KB article together and offered the best information to our help desks, who can support our mobile users.

The mobile security telemetry offered by Lookout is everything we currently need. We deployed a year ago, so as we mature, we will look for and build dashboards for all the telemetry the solution can provide. It integrates well with our MDM, and we have everything we need.  

The solution helps us maintain employee privacy; as with any new tool introduced, privacy was a concern for us. The user has to carry out the Lookout activation for a good reason because they're prompted to allow and disallow certain features. We had to go through all the privacy artifacts from our organization before deploying the tool, and we ensured effective communication with our users from the get-go. We had a successful deployment by being transparent and having regular contact with our users, senior management, and help desks.  

What needs improvement?

We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide APIs to customers so we can query our data and use it in the cloud, and this is the only outstanding area for improvement with the product right now.

Another improvement could be a more streamlined activation process for Android and iOS; there are several prompts when activating the application on a new device, and if that could be adapted to one click, that would be beneficial.

Buyer's Guide
Cloud Access Security Brokers (CASB)
December 2022
Find out what your peers are saying about Lookout, Netskope, Microsoft and others in Cloud Access Security Brokers (CASB). Updated: December 2022.
670,400 professionals have used our research since 2012.

For how long have I used the solution?

We've been using the solution for about a year. 

What do I think about the stability of the solution?

We haven't seen any degradation in performance by adding an additional agent on our devices, and we haven't encountered any situation that required a non-installation or reformat, so the stability is excellent.

What do I think about the scalability of the solution?

The beauty of SaaS is that we don't have to worry about on-prem infrastructure, being able to support the number of devices, or factoring in additional devices that we will bring in later. We never had an issue with availability, so the scalability is great.

How are customer service and support?

We can open and manage use cases through Lookout's platform, no product is perfect, but their responses are always within the SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We attempted to use another solution for many months; we deployed it, and it didn't work for us. We had issues integrating it with the MDM we use at the bank and our use cases. We spent a lot of time on pre-production, but we couldn't make the solution work according to our requirements.

How was the initial setup?

The deployment was relatively straightforward; it was medium to low in complexity. We did a lot of pre-deployment work, including gathering all the artifacts required to proceed, risk assessment for the vendor, privacy impact assessment, and due diligence artifacts. As it wasn't an on-prem deployment, we only had to ensure the connections out of the organization and to the cloud were secure, ensuring all lines were encrypted, and that the connector to our MDM tool was in place. We initially deployed in a pre-production tenant, so we had an idea of what to expect when moving to a production environment. We were familiar with all the required steps and the configuration.

My team supports the security stacks for all platforms, and with Lookout being a SaaS, the only task to do on our end is updating the agent, which is done automatically through our MDM. The MDM detects updates and pushes the agent out to all the mobile devices; we don't have to do anything manually.

What about the implementation team?

We implemented with our organization's teams, and we had partnerships; we wanted to ensure we had training included and initial PS hours, which were included in the initial help from the vendor. No third party was necessary; we confirmed it was built into the contract that we would have the training and PS hours assigned. We wanted a smooth and successful deployment, which is good for both the vendor and us, so it was an excellent two-way partnership.

What was our ROI?

We have seen an ROI with the platform and are delighted with it overall. We don't expect to find a perfect tool, but thanks to the partnership we built with Lookout, we look forward to a bright path ahead.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it.

What other advice do I have?

I rate the solution eight out of ten. 

Overall, my assessment of Lookout for helping secure our remote workers' access to devices is that no tool is perfect. We have to augment it with the other controls we have in place at the bank, but we're happy with the purchase and have replaced the previous tool that wasn't working for us. We're satisfied to have found a solution that works well for us.

We have yet to implement the endpoint detection and response with this particular product, but EDR is a feature we rely heavily upon for all our endpoints. We might not be licensed to use it yet with Lookout, so we have yet to qualify its EDR capabilities. 

To someone who has an existing mobile device management solution and doesn't want to add a secure web gateway product, there's a lot you can do with an MDM. Still, you usually can't run vulnerability management and attack prevention. With a mobile endpoint product, you can close the loop on the MDM, and that's how we use it. A robust MDM for device management and a good platform to reduce risks and manage vulnerability. In my opinion, you have to have both.   

My advice to others evaluating the solution is not to limit the protection of the mobile force to one product and to carry out a POC on several tools. Going for Lookout or any platform of this type, communication to the end user is the top priority, and top-to-bottom communication works very well in this case. It provides visibility and transparency from senior management to the end user. Communication is essential for a successful mobile endpoint security deployment.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Cloud Access Security Brokers (CASB) Report and find out what your peers are saying about Lookout, Netskope, Microsoft, and more!
Updated: December 2022
Buyer's Guide
Download our free Cloud Access Security Brokers (CASB) Report and find out what your peers are saying about Lookout, Netskope, Microsoft, and more!