Webflow Homepage
Lookout Logo
Lookout Logo Dark
  • Platform
    Platform
      • Phishing Protection
        Detects, blocks, and prevents phishing attacks that use fake emails, websites, or messages to trick users into revealing sensitive data.
      • Smishing Protection
        Built to detect, block, and stop SMS-based phishing attacks that lure users into clicking malicious links, disclosing sensitive data, or installing malware through text messages
      • Executive Impersonation Protection
        Detects and blocks attacks where cybercriminals pose as senior executives (e.g., CEO, CFO) to trick employees into sending money, sharing sensitive data, or performing other risky actions
      • Mobile Endpoint Security
        Designed to prevent and detect mobile-specific threats by scanning apps, monitoring network activity, checking for jailbreaks or rooting, and enforcing security policies
      • Mobile EDR
        Real-time monitoring, detection, investigation, and response for mobile devices, with forensic data collection for integration with broader EDR and SIEM systems
      • Mobile App Reputation Service
        Evaluates apps to identify risks, analyzing code for malware, and monitoring behavior like data leaks or suspicious activity
      • Mobile Vulnerability Management
        Scan devices for outdated OS versions and unpatched vulnerabilities, track CVEs, prioritizes fixes and enforce updates
      • Mobile Intelligence APIs
        Provide actionable security insights about mobile devices, apps, and users, enabling integration of mobile risk data into your broader security ecosystem.
      • Threat Intelligence Services
        Actionable data on attackers, tactics, vulnerabilities, and indicators of compromise, helping organizations anticipate and respond to cyber risks
      • Secure DNS
        Block malicious domains and encrypt DNS queries to prevent phishing, spoofing, and unauthorized access, without needing a VPN
  • Why Lookout
    • Why Lookout
      • Mobile: Distinctly Different
        Selecting the right tool for the job is essential for effective security—align your solution with the unique threats facing mobile devices, while safeguarding user privacy
      • The AI First Advantage
        This isn't just AI-enhanced security. It’s security reimagined for the modern mobile threat landscape.
      • Privacy Matters
        Privacy is central to mobile security as mobile devices blend personal and professional life
      • The Clear Standout
        A side-by-side look at top mobile endpoint security solutions reveals how we stack up
    • Threat Discovery
      Attackers Wielding DarkSword Threaten iOS Users
  • Partners
    • Partners
      • Partner Programs
        As a channel-first company, we've built a large and strategic network of partners, fostering mutual growth
      • Service Providers
        Gain cutting-edge protection solutions and complete peace of mind and significantly reduce your risk exposure
      • MSSP
        Elevate and grow your endpoint security business by leveraging our cutting-edge technology
      • Resellers and Distributors
        Unlock invaluable knowledge, extensive sales and technical resources, and incentives
      • Strategic Technology
        Achieve complete visibility and robust control over all sensitive data assets, transforming how you protect critical information
    • Latest Report
      Mobile Threat Landscape Report: Q3 2025
      What security leaders need to know as mobile becomes the primary entry point for identity abuse and cloud compromise.
  • Resources
    • Resources
      • Blogs
        Explore in-depth articles covering a wide range of cybersecurity topics.
      • Threat Lab
        Empower your organization with cutting-edge mobile threat intelligence.
      • Webinars
        Gain valuable knowledge and practical tips on securing your systems and data.
      • Podcasts
        Listen to insightful commentary and in-depth discussions on the latest cybersecurity trends and challenges.
      • Videos
        Watch our latest video content, including tutorials, product demonstrations, and expert interviews.
      • Virtual Demo Center
        Explore our extensive library of on-demand demos, allowing you to experience our solutions firsthand.
      • Documents
        Dig into our comprehensive collection of white papers, technical guides, and solution briefs.
      • Glossary
        Discover key security topics and understand the terminology used in the cybersecurity landscape.
    • Threat Discovery
      Attackers Wielding DarkSword Threaten iOS Users
  • Company
    • Company
      • About Us
        Discover our mission protecting organizations against the modern mobile threat landscape
      • Executive Leadership
        Learn about the vision and expertise guiding Lookout's innovative security solutions
      • Board of Directors
        Meet the members serving on our Board of Directors
      • Newsroom
        Stay informed with the latest news and company updates from Lookout
      • Upcoming Events
        Join us at our next digital or in-person event to connect with experts and industry peers
      • Careers
        Discover how you can contribute to shaping the future of mobile security
    • Latest Report
      Survey Results
      The Mobile Security Mirage: Unmasking Dangerous Misconceptions
      Learn what a recent global survey by Lookout of over 700 security leaders revealed
Search Button
Login
EnterprisePartners
Support
Enterprise Support LoginEnterprise Support Programs
EN
DeutschFrançaisItalianoEspañol
Visit Threat Lab
Get A Demo
Visit Threat Lab
← Back to use cases

Board of Directors

Meet our board of directors
Nick Adamo
Chairman of the Board of Directors, Commvault
Jim Dolce
Chairman & Chief Executive Officer, Lookout
John Hering
Co-Founder, Lookout
Jeff Jordan
General Partner, Andreessen Horowitz
Ping Li
Partner, Accel
Kevin Mahaffey
Co-Founder, Lookout
Nicholas Warner
Independent Board Member
Mike Volpi
Partner, Index Ventures
Lookout Logo
Lookout Logo
LegalPrivacy PolicyCookie PolicyTransparency Report
Do Not Sell or Share My Personal Information
Compliance InformationSitemap
© 2026 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® and the Lookout multi-color/multi-shaded Wingspan Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, and the 4 Bar Shield Design.
Why Lookout
Mobile: Distinctly DifferentThe AI First AdvantagePrivacy MattersThe Clear Standout
Partners
Partner ProgramsService ProvidersMSSPResellers & DistributersStrategic Technology
Company
About UsExecutive LeadershipBoard of DirectorsNewsroomUpcoming Events
Support
Enterprise Support LoginEnterprise Support Programs
Contact Us
How to Reach Us
(844) 371-5665