The Lookout phishing solution provides comprehensive protecton across both iOS and Android, and consumes nearly zero additional battery power.
Via SMS, messaging and apps
By blocking the connection to a phishing URL before it's established, Lookout protects users from phishing attacks delivered via any app (e.g., email, SMS, Slack, GMail, and Facebook Messenger).
Lookout identifies a malicious application at the point of download, which prevents any backdoor or unseen processes from automatically occurring.
Malformed content triggers OS or app vulnerabilities
Lookout inspects all URLs that the device attempts to access, and protecting you against infected attachments that attempt to communicate to an external malicious website.
Opening attachments and visiting links to potentially unsafe content
Lookout inspects all URLs that the device attempts to access, and provides protection against infected attachments that attempt to communicate to an external malicious website.
App-based Threat Classifications
With a data corpus of over 100 million apps, Lookout has granular visibility into malicous apps and maintains focused on app families that are a real risk to user’s privacy and security. This level of granularity enables Lookout to provide deeper protection across threat varients within threat families.
With Lookout, admins can create custom app policies as well as submit the app IPA, APK, or link to Lookout to validate app security. This allows organizations to assess the security of their custom-built mobile apps and create custom policies to ensure that every app in their fleet is secure.
Offline malware detection for Android
Lookout has robust offline protection against app, device, and configuration threats while the mobile device does not have a connection to the Lookout Security Cloud. Events are queued in a log and then the details of offline detection are sent to the console once a connection is restored.
Apps with vulnerable SDKs
Lookout scans apps to identify vulnerabilities that fall within all classes of the OWASP top 10 including coding errors, design flaws, as well as business logic issues. This is performed for both known and zero-day vulnerabilities.
Zero-day device compromise
Lookout has robust protection against device-based threats including detection of zero-day device compromise.
Lookout captures device forensic data that you can be use for analysis.
Device Privilege escalation
Lookout has excellent protection against device-based threats including device priviledge escalation.
Network Man-in-the-middle attack
Lookout only requires email addresss and approximate location and limits other app permissions. Lookout also does not display the domain names of blocked malicious sites to the admin.
Read your text messages (SMS or MMS)
Lookout does not require permission to read SMS and MMS messages, as it is a major intrusion of end user privacy.
Mobile technology patents
Lookout is the innovation leader with 160 patents on mobile security.
Mobile malware families discovered
Lookout Security Intelligence has discovered over 1,950 mobile malware families. Lookout has the mobile dataset and threat intelligence to discover sophisticated mobile threats as soon as they emerge, or sometimes even before they go live.
Enterprise Deployments of Mobile Threat Defense
Lookout is trusted by large enterprises to protect mobile fleets globally. With over 650 enterprise deployments across all industries, Lookout has 40% more enterprise deployments, demonstrating a best of breed technology, repeatedly chosen.
The Lookout app database has a data corpus of over 150 million mobile apps. Lookout continues to scan 90,000 mobile app daily. Only with this massive dataset and as part of the Google App Defense Alliance, can Lookout reliably scan all apps in the Google Play store on behalf of Google.
FedRAMP Joint Advisory Board Provisional Authorization to Operate (JAB P-ATO)
Lookout is the only mobile endpoint security solution to receive the "gold-standard" FedRAMP JAB P-ATO, which requires approval from the the U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS) and General Services Administration (GSA).