Lookout vs Competitors

See how Lookout mobile security leads the competition. Get a free copy of the IDC Marketscape report

Assessment Key

Excellent

Good

Fair

None

Excellent
Good
Fair
None

Phishing

Lookout

CrowdStrike

Check Point

Zimperium

Via email
Excellent
None
Good
Fair
Via SMS, messaging and apps
Excellent
None
Good
None
Drive-by-download
Excellent
None
Good
Fair
Malformed content that triggers OS or app vulnerabilities
Excellent
None
Good
None
Opening attachments and visiting links to potentially unsafe content
Excellent
None
Good
Fair

App

Lookout

CrowdStrike

Check Point

Zimperium

App-based threat classifications
Excellent
Fair
Fair
None
App forensic data
Excellent
Fair
None
Fair
Offline malware detection for Android
Excellent
None
None
Fair
Apps with vulnerable SDKs
Excellent
None
Fair
Fair

Device

Lookout

CrowdStrike

Check Point

Zimperium

Zero-day device compromise
Excellent
Fair
Fair
Good
Device forensic data
Excellent
None
Fair
Excellent
Device privilege escalation
Excellent
Good
Good
Excellent

Network

Lookout

CrowdStrike

Check Point

Zimperium

Network man-in-the-middle attacks
Excellent
Good
Excellent
Excellent

Privacy

Lookout

CrowdStrike

Check Point

Zimperium

Precise location (GPS)
Not Required
Not Required
Required
Required
Read your text messages (SMS or MMS)
Not Required
Not Required
Required
Not Required

Innovation

Lookout

CrowdStrike

Check Point

Zimperium

Patents
Fair
16
3
Mobile malware families discovered
> 1,950
Fair
21
3
Enterprise deployments of Mobile Threat Defense
> 650
1,287
< 250
< 20
Scanned app database
150 million
Fair
> 7 million
< 50
FedRAMP Joint Advisory Board Provisional Authorization to Operate (JAB P-ATO)
Yes
No
No
> 3 million

Lookout leads mobile security: Get free copy of IDC Marketscape report