So basically, an administrator could load the Lookout application on their fleet of devices, regardless of whether they were personally owned or corporately owned devices. And they could use that to enforce policy with respect to security and compliance for mobile applications. For example, if the business didn't want TikTok on their fleet devices because they were concerned about possible cyber threats through TikTok, then they could see who had the device and enforce if somebody had TikTok on the device, they could basically lock that device out of the corporate environment until the person remediated the threat.
Manager of Product Development Team at a tech consulting company with 10,001+ employees
Real User
2023-05-23T08:40:00Z
May 23, 2023
Our primary use case for Lookout is security for our enterprise mobile phones. Lookout provides security including antivirus, scanning, and other features.
Director Endpoint Security at a financial services firm with 10,001+ employees
Real User
2022-12-22T18:54:00Z
Dec 22, 2022
Our primary use case is to secure our corporate and bring-your-own mobile devices to prevent malware threats. The solution is a secure tool to protect against rogue attacks, threats, vulnerabilities, malware, rootkit applications etc. We have the SaaS instance of Lookout, so we don't have anything on-prem.
Threat Intelligence Platforms offer organizations tools to identify, assess, and manage cyber threats efficiently. They integrate with existing security systems, enhancing threat detection and response capabilities to ensure robust cybersecurity defenses.These platforms aggregate and analyze threats from numerous sources, providing valuable insights into potential vulnerabilities and attack vectors. They are essential for organizations looking to streamline their cybersecurity efforts by...
We use Lookout for mobile devices, such as phones.
So basically, an administrator could load the Lookout application on their fleet of devices, regardless of whether they were personally owned or corporately owned devices. And they could use that to enforce policy with respect to security and compliance for mobile applications. For example, if the business didn't want TikTok on their fleet devices because they were concerned about possible cyber threats through TikTok, then they could see who had the device and enforce if somebody had TikTok on the device, they could basically lock that device out of the corporate environment until the person remediated the threat.
Our primary use case for Lookout is security for our enterprise mobile phones. Lookout provides security including antivirus, scanning, and other features.
Our primary use case is to secure our corporate and bring-your-own mobile devices to prevent malware threats. The solution is a secure tool to protect against rogue attacks, threats, vulnerabilities, malware, rootkit applications etc. We have the SaaS instance of Lookout, so we don't have anything on-prem.