Achieving Secure Access: How to Implement Zero Trust for Remote Workers

Read this guide to learn how to implement zero trust for remote workers, including implementing least privilege access and integrating mobile devices.

Understanding How NIST Shapes the Zero Trust Security Framework

Learn about the NIST zero trust model’s guidelines for how modern organizations should strengthen their cybersecurity posture and protect their IT infrastructure.

Replacing Traditional Security Models: Why the Shift to Zero Trust Matters

Explore why zero trust security solutions replaced the perimeter-based approach in response to modern cyber threats and business realities.

Understanding the Zero Trust Framework

Learn how to build a zero trust framework in your organization by implementing continuous verification, least privilege principles, and microsegmentation.

Why Multifactor Authentication (MFA) Alone Isn't Enough to Secure Your Systems

Looking to strengthen your organization’s cybersecurity posture? Here’s why multifactor authentication isn’t enough by itself and what to look for next.

5 Zero Trust Remote Access Solutions Your IT Team Needs to Know

Implement zero trust remote access solutions at your workplace by requiring stringent identity checks, limiting permissions, and analyzing user behavior.

Enhancing Security With Zero Trust Adoption

Discover how a zero trust approach can improve your security stance, as well as key challenges to achieving zero trust adoption at your organization.

A New Approach to Data Security for the New Year

Going into 2023, your organization should be laser-focused on identity and data, and the technologies that secure these elements will have to evolve.

A Security Work Stream Is Critical to IT Modernization

IT cloud modernization is a great way to drive sales growth, have the edge over your competitors, and boost your employees’ productivity while enabling greater collaboration.

Move On Up: Applying Zero Trust Design to the Office

When organizations switch offices to accommodate business needs, moving can be a major stressor for IT teams — but it doesn’t need to be.

How to Stay Current with Changing Security Landscape: Feat. Head of Security from BNP Paribas

I spoke with Ramy Houssaini, Chief Cyber and Technology Risk Officer at BNP Paribas, about the challenges CISOs face in an increasingly complex digital landscape.

Seamless Path to Zero Trust for Texas: Lookout Receives TX-RAMP Level 2 Certification

With the TX-RAMP certification, Lookout offers a seamless path for all state entities to meet the OMB-mandated Zero Trust requirements.

Three Lessons from the Confluence Server Vulnerability (CVE-2022-26134)

The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant full command.

Lookout Accelerates Zero Trust Journey for Ivanti Customers With SSE

We’re offering Ivanti customers the opportunity to smoothly transition into a Zero Trust security posture without leaving behind their existing tools.

Don’t Leave it to Your Apps: Security Needs is a Shared Responsibility

Whether you’re building your footprint on-premises, on the cloud or on a hybrid architecture, security needs to be a converged effort.

4 Ways to Assess Your Zero Trust Security Posture

While most of us understand Zero Trust conceptually, the path to Zero Trust is complex and constantly evolving. In this blog, I break down what is and what isn’t Zero Trust.

Start Your Zero Trust Journey With the Gartner® SASE Roadmap

Discover why companies need to embrace zero trust and the SASE convergence with a plan. Get started today with the Gartner SASE Roadmap.

Achieving Zero Trust? One Size Does Not Fit All

We discuss the opportunities and challenges mobile and cloud technologies have created with Art Ashmann, Staff EUC Solutions Engineer at VMware.

Our SASE Journey: Lookout Head of IT Talks Shop

To give you insight into how Lookout implements our SASE platform and how you can get started, we sat down with our director of IT systems...

Lookout and U.S. Govt. on New Vision for Zero Trust

We're excited that we have been selected by the National Institute of Standards and Technology (NIST) to collaborate on its Zero Trust architecture development efforts.

Zero Trust Requires Continuous Data and Endpoint Telemetry

By integrating our security and access platforms we are able to extend Lookout CCA and provide a modern approach to Zero Trust.

Go Cloud or Go Home: The Advantage of Cloud-Delivered Cybersecurity

We discuss why on-premises solutions are no longer feasible in a remote-first environment and how Zero Trust can only be done by leveraging the power of the cloud.

Four Steps to Modernizing Government Cybersecurity | Zero Trust

It is vital for agencies to understand the steps they can take right now to implement Zero Trust to safeguard against modern cyber attacks and comply with new regulations.

Expanded Partnership with Google Cloud | Zero Trust Security

Today, I’m excited to announce Lookout has entered into an expanded partnership with Google Cloud to deliver endpoint-to-cloud security to organizations around the world.

Lookout Named Best Mobile Security Solution by the SC Awards

I’m pleased to share that Lookout Mobile Endpoint Security has achieved yet another leadership milestone by being named SC Awards’ Best Mobile Security Solution of 2021.

The Zero Trust Lesson Behind Mobile Phishing Against Australian Officials

Australia recently confirmed that a series of mobile phishing attacks were successfully executed on senior officials. Discover more at Lookout today.

The Future of Cloud-Delivered Security: Lookout Acquires CipherCloud

Today Lookout announced that we’ve acquired CipherCloud, a leading cloud-native security company that operates in the emerging Secure Access Service Edge (SASE) market.

What SolarWinds Teaches Us About Zero Trust for Mobile Endpoints

On 12/17/2020, CISA put out an alert about an advanced persistent threat (APT) that compromised a number of U.S. government agencies, tech companies and public facilities.

Google & Lookout Partner to Deliver Zero Trust for Mobile Devices

Together, Lookout Continuous Conditional Access and Google Cloud Identity protect your Google Workspaces from malicious threats.

The Government IT Problem: Your Security Perimeter Has Disappeared

Government work has changed. Critical data needed for employees to work has moved to the cloud and needs to be accessible from any device, wherever employees are.

Helping Higher Education Tackle Today’s Cybersecurity Challenges

The perimeter has fully disappeared, and thankfully there are solutions that allow higher education institutions to safely and securely leverage innovation.

2018 Gartner Market Guide for Mobile Threat Defense

Gartner Market Guide for Mobile Threat Defense has a message: “Security and risk management leaders should leverage MTD to address evolving mobile security needs."

Post-Perimeter Security | Zero Trust

Security must move to the endpoint because devices can no longer be trusted. Enterprises need a new security architecture called post-perimeter security.

Cloud Applications: A Zero Trust Approach to Energy

Accelerated adoption of the cloud has driven energy organizations to rely more heavily on cloud-based productivity suites and apps that access data from anywhere.

Zero Trust Lab Demo

At Lookout, we deliver a fully unified data-centric cloud security platform. Learn how you can secure your data using the industry’s most advanced cloud security platform.

5 Best Practices for Achieving Zero Trust

More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time.

Guilty Until Proven Innocent – Playing by Zero Trust Laws

Learn how Tyler Cohen Wood helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats

A Zero Trust Approach to Security for Healthcare

Find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – be it SaaS, IaaS or on-premise

Zero Trust – Securing the Remote Enterprise

We don’t need to be in the office to stay productive anymore. Cloud apps and mobile devices have enabled us to connect to work from anywhere.

Zero Trust? Don’t Forget Your Mobile Fleet

Does your Zero Trust strategy include mobile devices? If not, it might have a zero chance of being successful. Hear how to deliver continuous authentication for mobile users.

What is Zero Trust?

The Zero Trust approach enables organizations to restrict access controls to networks and applications without sacrificing performance & user experience.