Lookout vs Check Point

See how Lookout mobile security leads the competition. Get a free copy of the IDC Marketscape report

Assessment Key

Excellent

Good

Fair

None

Excellent
Good
Fair
None

Phishing

Lookout

Check Point

Via email
Excellent
Good
The Lookout phishing solution provides comprehensive protecton across both iOS and Android, and consumes nearly zero additional battery power. Check Point's phishing protection is also available on both operating systems, however, it consumes more battery power when enabled.
Via SMS, messaging and apps
Excellent
Good
By blocking the connection to a phishing URL before it's established, Lookout protects users from phishing attacks delivered via any app (e.g., email, SMS, Slack, GMail, and Facebook Messenger). Check Point's phishing protection has recently been updated to address these vectors but battery consumption is still a concern.
Drive-by-download
Excellent
Good
Lookout identifies a malicious application at the point of download, which prevents any backdoor or unseen processes from automatically occuring. Check Point does not warn the user until the application actually starts to install iteself, which could be too late.
Malformed content triggers OS or app vulnerabilities
Excellent
Good
Lookout inspects all URLs that the device attempts to access, and protecting you against infected attachments that attempt to communicate to an external malicious website.
Opening attachments and visiting links to potentially unsafe content
Excellent
Good
Lookout inspects all URLs that the device attempts to access, and provides protection against infected attachments that attempt to communicate to an external malicious website.

App

Lookout

Check Point

App-based Threat Classifications
Excellent
Fair
With a data corpus of over 100 million apps, Lookout has granular visibility into malicous apps and maintains focused on app families that are a real risk to user’s privacy and security. This level of granularity enables Lookout to provide deeper protection across threat varients within threat families.
App forensic data
Excellent
None
With Lookout, admins can create custom app policies as well as submit the app IPA, APK, or link to Lookout to validate app security. This allows organizations to assess the security of their custom-built mobile apps and create custom policies to ensure that every app in their fleet is secure. Check Point does not have these capabilities.
Offline malware detection for Android
Excellent
None
Lookout has robust offline protection against app, device, and configuration threats while the mobile device does not have a connection to the Lookout Security Cloud. Events are queued in a log and then the details of offline detection are sent to the console once a connection is restored. Customers who have tested Check Point offline protection report that it does not work.
Apps with vulnerable SDKs
Excellent
Fair
Lookout scans apps to identify vulnerabilities that fall within all classes of the OWASP top 10 including coding errors, design flaws, as well as business logic issues. This is performed for both known and zero-day vulnerabilities.

Device

Lookout

Check Point

Zero-day device compromise
Excellent
Fair
Lookout has robust protection against device-based threats including detection of zero-day device compromise. Customers who have evalated Check Point report they have limited zero-day device compromise capability.
Device forensic data
Excellent
Fair
Lookout captures device forensic data that you can be use for analysis. Check Point does not make forensic data as readily available for analysis.
Device Privilege escalation
Excellent
Excellent
Lookout has excellent protection against device-based threats including device priviledge escalation. Check Point can detect a subset of device priviledge escalations.

Network

Lookout

Check Point

Network Man-in-the-middle attack
Excellent
Excellent
Check Point has solid protection against network-based threats, but unfortunately this is one of the least risky threat vectors. For the average user, there is far greater risk of encountering mobile phishing attack or a malicious application on their device.

Privacy

Lookout

Check Point

Precise Location (GPS)
Not Required
Required
Lookout only requires email addresss and approximate location and limits other app permissions. Lookout also does not display the domain names of blocked malicious sites to the admin. Check Point impacts user privacy by requiring requires first and last name, email address, and precise location.
Read your text messages (SMS or MMS)
Not Required
Required
Check Point retains permission to read SMS and MMS messages. Lookout does not require this permission as it is a major intrusion of end user privacy.

Innovation

Lookout

Check Point

Mobile technology patents
160
16
Lookout is the innovation leader with 160 patents on mobile security.
Mobile malware families discovered
> 1,950
21
Lookout Security Intelligence has discovered over 1,950 mobile malware families. This outpaces Check Point, who have discovered 21. Only Lookout has the mobile dataset and threat intelligence to discover sophisticated mobile threats as soon as they emerge, or sometimes even before they go live.
Enterprise Deployments of Mobile Threat Defense
> 650
< 250
Lookout is trusted by large enterprises to protect mobile fleets globally. With over 650 enterprise deployments across all industries, Lookout has 40% more enterprise deployments, demonstrating a best of breed technology, repeatedly chosen.
Scanned App Database
> 150 million
> 7 million
With a data corpus of over 100 million mobile apps, the Lookout app database is 14 times larger than Check Point's and Lookout continues to scan 90,000 mobile app daily. Only with this massive dataset and as part of the Google App Defense Alliance, can Lookout reliably scan all apps in the Google Play store on behalf of Google.
FedRAMP Joint Advisory Board Provisional Authorization to Operate (JAB P-ATO)
Yes
No
Lookout is the only mobile endpoint security solution to receive the "gold-standard" FedRAMP JAB P-ATO, which requires approval from the the U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS) and General Services Administration (GSA). In late 2019, Check Point obtained an "agency" FedRAMP 'In Process' ATO sponsored by only one agency.

Lookout leads mobile security: Get free copy of IDC Marketscape report