November 14, 2018
Lookout Recognized in the Gartner Market Guide for Mobile Threat Defense for the Third Year in a Row
San Francisco, CA - November 15, 2018 - Lookout, the leader in securing the post-perimeter world, announced today that for the third year in a row it is listed as a Representative Vendor in Gartner’s Market Guide for Mobile Threat Defense Solutions. Lookout Endpoint Security provides comprehensive and continuous assessment of risk across iOS and Android devices to secure against app, device and network-based threats.
Mobile Threat Defense solutions have graduated to become an important part of an enterprise’s security architecture. Enterprises are embracing cloud solutions to perform central work tasks. These solutions house sensitive corporate data, which employees can access from any endpoint, including mobile devices, from any network. A corporation’s traditional perimeter security, in this new world of work, no longer applies. Enterprises have a new mandate to protect data from threats and risks that are unique to this work-from-anywhere environment.
According to Gartner, “Mobile threat defense (MTD) solutions have matured and can provide value to organizations looking to strengthen their mobile security. Security and risk management leaders should leverage MTD to address evolving mobile security needs." Lookout Mobile Endpoint Security makes it easy to get visibility into the entire spectrum of mobile risk, apply policies to measurably reduce that risk, and integrate into your existing security and mobile management solutions.
“We believe our inclusion in the 2018 Gartner Market Guide for Mobile Threat Defense validates our vision of a security architecture that protect enterprises in today’s perimeter-less, cloud-delivered, and privacy-focused world,” said Jim Dolce, CEO, Lookout. “As our customers and partners are faced with the rapid rise of a mobile-first workforce and sophisticated attacks that take advantage of this perimeter-less world, they need security that connects endpoint protection, access to cloud services, and identity, across managed and unmanaged devices.”
As the proven leader in the Mobile Threat Defense market, Lookout Mobile Endpoint Security is uniquely positioned to deliver post-perimeter security. Centered on the continuous protection of corporate data when accessed by devices outside the corporate perimeter, Lookout:
- Enables continuous conditional access to their corporate data, from any device. With Lookout Mobile Endpoint Security, enterprises have the opportunity to select, based on their risk tolerance, policies that help ensure devices stay compliant with internal and external mandates. If a device exceeds the acceptable level of risk, as defined by the enterprise, Lookout will send a remediation message to the employee, flag the issue to the admin in the Lookout Mobile Endpoint Security console, and log the employee out of any corporate resources.
- Moves security to the endpoint. Lookout Phishing and Content Protection lives on the device, monitoring for phishing attacks across many vectors including social media apps, messaging apps, SMS, and any app that makes a network connection.
Lookout combines cloud-based detection informed by millions of endpoints with leading on-device security to deliver continuous risk assessment of an endpoint. Whether connected or off line, Lookout provides the ability to detect and remediate threats using a hybrid approach to cloud and device based security. Lookout’s ability to dynamically allow or block access gives organizations the ability to build policies that define how users connect to the enterprise on devices that are often beyond the reach of IT.
(1) Gartner, Inc. “Market Guide for Mobile Threat Defense” by Dionisio Zumerle, John Girard, October 30, 2018.
Gartner disclaimer
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.