September 3, 2020

-
min read

Lookout Named Mobile Threat Mgmt Software Leader for 3rd Year

The IDC MarketScape for Mobile Threat Management Software just named Lookout a leader for the third consecutive year. Everyone at Lookout works hard to make sure we provide the best mobile security for our customers, so it’s incredibly satisfying to have the MarketScape recognize our capabilities and strategies.

We’re honored for the recognition of our capabilities for the third consecutive year. One capability highlighted by The IDC MarketScape: Worldwide Mobile Threat Management Software 2020 Vendor Assessment (doc #US46092220, September 2020) as key for MTMs and a major strength of Lookout is being able to secure unmanaged devices equally as well as managed devices.

IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. The Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the icons.

We understand this really well because our security platform is built from the ground up to deliver modern endpoint security that preserves personal privacy. Increasingly, organizations are implementing bring-your-own-device (BYOD) policies to enable employees to use personal phones and tablets to remain productive while working from home. We pride ourselves on being able to protect you regardless of where you choose to work or what device you use – which is more relevant than ever before.

Our mission is to secure and empower our privacy-focused digital future where mobile devices are at the center of it. Mobile devices, and their modern operating systems like iOS, Android and ChromeOS, are increasingly becoming the primary computing platform and an extension of your personal identity. So let me take the opportunity to break down some of the reasons why the IDC MarketScape identified us as a mobile threat management software leader.

Lookout protects your devices whether they’re managed or not

The IDC MarketScape states that mobile security has become a more mainstream, widely adopted security technology and is no longer just for the highly regulated industries or government agencies. Every organization has mobile devices accessing its data, and our role as a security provider is to enable you and ensure security is not a roadblock. That’s why we have built our security capabilities to be cutting edge for both managed and unmanaged devices.

Lookout has strong partnerships

With everyone continuing to work away from the office, mobile devices have become a critical part of every person’s daily workflow. Cloud-based productivity suites are empowering workers to stay productive regardless of the network they connect to or the device they use. Lookout seamlessly integrates with Microsoft Office 365 and Google G Suite to implement Zero Trust even if your devices aren’t managed. We continuously monitor your device’s health and won’t allow them to connect to your cloud apps unless they are free of compromise.

Lookout integrates with your security stack

For managed devices, our platform integrates with all of the major unified endpoint management (UEM) solutions on the market. Most importantly, we have the deepest technical integrations available with the leading two UEMs: Microsoft Mobile Endpoint Manager (formerly Intune) and VMware Workspace ONE.

In addition to feeding endpoint health data to these UEMs to provide continuous conditional access based on Zero Trust, we also integrate with their solutions for unmanaged devices – App Protection Policies built into Microsoft Office 365 and Boxer by VMware. For organizations using Microsoft Defender Advanced Threat Protection and VMware Workspace One Intelligence, we provide a single pane of glass and security automation. Beyond Microsoft and VMware, we offer state-of-the-art integrations into your ecosystem with unified endpoint management (UEM), security information and event management (SIEM) solutions and the Lookout Mobile Risk API for custom integrations.

We have a deep understanding of the mobile threat landscape

The Lookout artificial intelligence-powered platform has analyzed nearly 215 million devices and over 269 million apps. We know what mobile threats look like, whether it’s a phishing link, a malicious app, or vulnerabilities on networks, devices or apps. As a result, we can automatically identify threats even if we have never seen them before. And because we’re continuously protecting millions of devices around the world, our platform is constantly improving as it discovers more threats.

Our understanding of mobile threats goes beyond a sound technical architecture and approach. The proof is in our real-world threat discoveries. Over the past five years, our unique threat intelligence has consistently uncovered some of the most sophisticated threats in the wild, such as Pegasus by NSO Group, and Monokle, which was developed by a Russian company best known for its role in interfering in the 2016 U.S. Presidential election. In July, The New York Times covered our discovery of sophisticated Chinese surveillance campaigns operating in fourteen countries and targeting the Uighur minority.

Think about what matters to your organization

I’m honored by the recognition we received from the IDC MarketScape again this year. It aligns with customer feedback we receive and the high standards we set for ourselves.

But at the end of the day, there are two criteria I recommend you consider when evaluating a mobile security solution. First, can this platform evolve within the constantly changing mobile landscape? Second, can it protect my data the way it is accessed today and in the future, which for most organizations includes employees using their personal devices and working outside the reach of my office perimeter?

Visit our platform page to find out how Lookout provides modern endpoint security.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.