April 6, 2022

min read

Lookout Helps a Large Construction Firm Securely Share Data

Construction firms rely on a vast network of architects, engineers, project managers, contractors, and suppliers to collaborate on projects of all sizes and complexities. While the digitization of the construction industry has made it easier for these project teams to share information, it also expands the cyber-attack surface.

One of the country’s largest commercial and civil contractors turned to Lookout to help improve cybersecurity posture and reduce business risk. The firm regularly shares documents between employees and third-party partners — including architectural plans, technical drawings, and other sensitive information — through Box and Google Drive. Sensitive project data stored in Salesforce is also widely accessible. While replacing on-site, paper-based workflows with digital solutions has made their operation more efficient, it also puts intellectual property at risk of being stolen or compromised. 

The firm realized that its cloud-based tools offered limited security controls that were insufficient for broad third-party access to its sensitive information. Its three main areas of concern were:

  • The ability to protect sensitive documents downloaded onto an unmanaged partner or bring-your-own device (BYOD), both on the site and after they’ve finished the job.
  • The use of unsanctioned IT applications that may expose sensitive documents.
  • Protection against viruses or malware that could infect files uploaded into cloud services by a partner.

‍With those concerns in mind, here’s how Lookout helped the firm secure their cloud apps and enable collaboration with third-party partners. 

Native data protection in a single, cloud-native platform

After a thorough evaluation, the firm turned to Lookout to provide efficient and secure access for its third-party partners. Lookout Secure Cloud Access with native data loss prevention (DLP) and enterprise digital rights management (EDRM) provided a complete set of features needed to secure broad-based, third-party collaboration — all in a single, cloud-native platform.

The initial implementation included Lookout Secure Cloud Access for Box, Google Drive, and Salesforce in an API-based deployment. The solution serves as a visibility and policy enforcement tool, operating between user devices and the cloud apps they’re accessing. It enables the firm to take a granular approach to data protection, making it possible to safely use cloud services for third-party collaboration.

Protection that follows the data 

As a national builder, the firm maintains more than 4,000 employees and thousands of contractors spread across multiple job sites. While contractors are independently employed, they still require access to sensitive documents on the job site. The IT team had to implement security controls across this broad set of users while facilitating seamless collaboration. 

For consistency, a common set of DLP policies had to be created and enforced across Google Drive and Box. DLP policies act as guardrails to help prevent users from unintentionally exposing sensitive data. The system can take actions such as removing public links, quarantining data, and watermarking sensitive files based on policy decisions. 

Lookout EDRM added the ultimate level of protection. With its file encryption and access policy enforcement capabilities, EDRM enables partners to create, view, and modify information securely while protecting it from unauthorized access, use, and distribution. For example, files with a .VSD extension — which might hold CAD drawings, charts or images — can be encrypted and shared with partners while on the job. IT can revoke access based on various parameters such as the domain, email address, or the timeframe it’s accessed. Detailed, correlated, and normalized logs provide the firm's IT security team visibility to who opens a document, what device it’s opened on, and where it’s viewed. 

In the shadows

With data shared across numerous third parties using personal or unmanaged devices, there’s an inevitable risk of information leaking to apps that aren’t sanctioned or supported by the firm’s IT team. This issue, known as shadow IT, is a widespread challenge that’s grown exponentially in recent years with the adoption of cloud-based apps. Simply put, if IT isn’t aware of an app, they can’t support it or ensure it’s secure. 

Because shadow IT can introduce serious security risks and result in the loss of sensitive information, the firm’s IT team depends on Lookout to provide discovery, management, and enforcement of shadow IT apps. Lookout tracks more than 16,000 known apps in our extensive knowledge base. If an employee or contractor accesses any of those apps, it'll be shown in the traffic log. Once discovered, IT can address each unsanctioned and prohibited app on a case-by-case basis.

Protecting against external threats

With data moving fluidly between the firm and its network of contractors, there was a real possibility that someone might upload files containing malware, trojans, or viruses onto Google Drive or Box. Once cloud storage systems are infected, these threats spread quickly to other users and devices. The firm deployed Lookout’s anti-virus and anti-malware (AVAM) solution to mitigate this threat. AVAM automatically blocks infected files from being uploaded and quarantines the suspect file for further investigation by the internal security team. 

With Lookout AVAM, partners can work safely together without worrying about malicious content compromising their infrastructure. In fact, after deploying Lookout, the firm’s IT team was alerted to a ransomware threat from a partner integration. Lookout detected abnormal behavior and quarantined the malware before it spread and inflicted lasting damage. 

Continuing the journey to the cloud with Lookout

With three of their most critical SaaS apps adequately secured, the construction firm’s IT team is ready to extend the Lookout platform to other components. Thanks to Lookout’s unified approach, they can seamlessly push existing data protection policies to new apps with confidence.

For more on how Lookout secures data sharing between organizations and their partners, take a peek at this short video:

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.