So basically, an administrator could load the Lookout application on their fleet of devices, regardless of whether they were personally owned or corporately owned devices. And they could use that to enforce policy with respect to security and compliance for mobile applications. For example, if the business didn't want TikTok on their fleet devices because they were concerned about possible cyber threats through TikTok, then they could see who had the device and enforce if somebody had TikTok on the device, they could basically lock that device out of the corporate environment until the person remediated the threat.
Manager of Product Development Team at a tech consulting company with 10,001+ employees
Real User
2023-05-23T08:40:00Z
May 23, 2023
Our primary use case for Lookout is security for our enterprise mobile phones. Lookout provides security including antivirus, scanning, and other features.
Director Endpoint Security at a financial services firm with 10,001+ employees
Real User
2022-12-22T18:54:00Z
Dec 22, 2022
Our primary use case is to secure our corporate and bring-your-own mobile devices to prevent malware threats. The solution is a secure tool to protect against rogue attacks, threats, vulnerabilities, malware, rootkit applications etc. We have the SaaS instance of Lookout, so we don't have anything on-prem.
Threat Intelligence Platforms provide comprehensive solutions for collecting, analyzing, and managing threat data. They enhance security teams' understanding and response capabilities, ensuring proactive defense against emerging threats.These platforms aggregate vast amounts of threat data from multiple sources, offering a centralized interface for organizations to manage and analyze security threats efficiently. By automating threat data collection and enhancing threat analysis, they enable...
We use Lookout for mobile devices, such as phones.
So basically, an administrator could load the Lookout application on their fleet of devices, regardless of whether they were personally owned or corporately owned devices. And they could use that to enforce policy with respect to security and compliance for mobile applications. For example, if the business didn't want TikTok on their fleet devices because they were concerned about possible cyber threats through TikTok, then they could see who had the device and enforce if somebody had TikTok on the device, they could basically lock that device out of the corporate environment until the person remediated the threat.
Our primary use case for Lookout is security for our enterprise mobile phones. Lookout provides security including antivirus, scanning, and other features.
Our primary use case is to secure our corporate and bring-your-own mobile devices to prevent malware threats. The solution is a secure tool to protect against rogue attacks, threats, vulnerabilities, malware, rootkit applications etc. We have the SaaS instance of Lookout, so we don't have anything on-prem.