Assessment Key
Excellent
Good
Fair
None
Phishing
Lookout
Check Point
The Lookout phishing solution provides comprehensive protecton across both iOS and Android, and consumes nearly zero additional battery power. Check Point's phishing protection is also available on both operating systems, however, it consumes more battery power when enabled.
Via SMS, messaging and apps
By blocking the connection to a phishing URL before it's established, Lookout protects users from phishing attacks delivered via any app (e.g., email, SMS, Slack, GMail, and Facebook Messenger). Check Point's phishing protection has recently been updated to address these vectors but battery consumption is still a concern.
Lookout identifies a malicious application at the point of download, which prevents any backdoor or unseen processes from automatically occuring. Check Point does not warn the user until the application actually starts to install iteself, which could be too late.
Malformed content triggers OS or app vulnerabilities
Lookout inspects all URLs that the device attempts to access, and protecting you against infected attachments that attempt to communicate to an external malicious website.
Opening attachments and visiting links to potentially unsafe content
Lookout inspects all URLs that the device attempts to access, and provides protection against infected attachments that attempt to communicate to an external malicious website.
App
Lookout
Check Point
App-based Threat Classifications
With a data corpus of over 100 million apps, Lookout has granular visibility into malicous apps and maintains focused on app families that are a real risk to user’s privacy and security. This level of granularity enables Lookout to provide deeper protection across threat varients within threat families.
With Lookout, admins can create custom app policies as well as submit the app IPA, APK, or link to Lookout to validate app security. This allows organizations to assess the security of their custom-built mobile apps and create custom policies to ensure that every app in their fleet is secure. Check Point does not have these capabilities.
Offline malware detection for Android
Lookout has robust offline protection against app, device, and configuration threats while the mobile device does not have a connection to the Lookout Security Cloud. Events are queued in a log and then the details of offline detection are sent to the console once a connection is restored. Customers who have tested Check Point offline protection report that it does not work.
Apps with vulnerable SDKs
Lookout scans apps to identify vulnerabilities that fall within all classes of the OWASP top 10 including coding errors, design flaws, as well as business logic issues. This is performed for both known and zero-day vulnerabilities.
Device
Lookout
Check Point
Zero-day device compromise
Lookout has robust protection against device-based threats including detection of zero-day device compromise. Customers who have evalated Check Point report they have limited zero-day device compromise capability.
Lookout captures device forensic data that you can be use for analysis. Check Point does not make forensic data as readily available for analysis.
Device Privilege escalation
Lookout has excellent protection against device-based threats including device priviledge escalation. Check Point can detect a subset of device priviledge escalations.
Network
Lookout
Check Point
Network Man-in-the-middle attack
Check Point has solid protection against network-based threats, but unfortunately this is one of the least risky threat vectors. For the average user, there is far greater risk of encountering mobile phishing attack or a malicious application on their device.
Privacy
Lookout
Check Point
Lookout only requires email addresss and approximate location and limits other app permissions. Lookout also does not display the domain names of blocked malicious sites to the admin. Check Point impacts user privacy by requiring requires first and last name, email address, and precise location.
Read your text messages (SMS or MMS)
Check Point retains permission to read SMS and MMS messages. Lookout does not require this permission as it is a major intrusion of end user privacy.
Innovation
Lookout
Check Point
Mobile technology patents
Lookout is the innovation leader with 160 patents on mobile security.
Mobile malware families discovered
Lookout Security Intelligence has discovered over 1,950 mobile malware families. This outpaces Check Point, who have discovered 21. Only Lookout has the mobile dataset and threat intelligence to discover sophisticated mobile threats as soon as they emerge, or sometimes even before they go live.
Enterprise Deployments of Mobile Threat Defense
Lookout is trusted by large enterprises to protect mobile fleets globally. With over 650 enterprise deployments across all industries, Lookout has 40% more enterprise deployments, demonstrating a best of breed technology, repeatedly chosen.
With a data corpus of over 100 million mobile apps, the Lookout app database is 14 times larger than Check Point's and Lookout continues to scan 90,000 mobile app daily. Only with this massive dataset and as part of the Google App Defense Alliance, can Lookout reliably scan all apps in the Google Play store on behalf of Google.
FedRAMP Joint Advisory Board Provisional Authorization to Operate (JAB P-ATO)
Lookout is the only mobile endpoint security solution to receive the "gold-standard" FedRAMP JAB P-ATO, which requires approval from the the U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS) and General Services Administration (GSA). In late 2019, Check Point obtained an "agency" FedRAMP 'In Process' ATO sponsored by only one agency.