Looking for a simple way to detect and stop executive impersonation and smishing threats before they infiltrate your cloud? Join Lookout and Verizon to learn how cybercriminals are gaining access to sensitive data and what you can do to stop them: https://bit.ly/3NOS3vO
Lookout
Computer and Network Security
Boston, Massachusetts 63,509 followers
We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data.
About us
Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real time. The Lookout Cloud Security Platform is purpose-built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final cloud data extraction. We are trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and securely. Headquartered in Boston, Lookout has offices in Amsterdam, London, Sydney, Tokyo, Toronto and Washington, D.C.
- Website
-
https://www.lookout.com
External link for Lookout
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Boston, Massachusetts
- Type
- Privately Held
- Founded
- 2007
- Specialties
- mobile, security, cybersecurity, enterprise security, enterprise mobile security, byod, CASB, ZTNA, data security, #SSE, threat intelligence, mobile threat defense, and Security Service Edge
Locations
-
Primary
3 Center Plaza
suite 330
Boston, Massachusetts 02108, US
Employees at Lookout
-
Bill Willcox
Software Engineer | Embedded | TCP/IP Networking | Architect | Tech Lead | Concept to Deployment | Full Stack
-
Jean Christophe Prudhomme
Regional Channel Manager South Europe at Lookout
-
Simon Holland
Endpoint to Cloud Security
-
Jeremy Sears
Senior Principal Software Engineer at Lookout
Updates
-
Learn why this leading organization chose Lookout to secure sensitive #data across their #SaaS environment: https://bit.ly/3XROefp
-
Download our e-book to learn the five steps towards full visibility and control across your organization: https://bit.ly/3TEax5D
-
Why would a cybercriminal pretend to be your CEO? Join Verizon and Lookout as we explore the new threat trend of executive impersonation and how to protect your sensitive cloud data. https://bit.ly/3UvHv8B
-
When it comes to employee-owned mobile devices: ➔ Employees want privacy. ➔ Employers want security. Discover how Lookout allows you to balance protection and privacy, keeping employees happy and sensitive data safe. Read the blog: https://lnkd.in/grckJ8T4
-
We’ve all received a text like this. But, when employees use their mobile devices to access corporate data in the cloud, a text like this could easily lead to a data breach. Test your mobile phishing defenses today, take our free SMS Phishing Assessment: https://lnkd.in/gbxskeTT
-
Attackers are exploiting #SSO to gain access to your #cloud data. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://bit.ly/3KiKjRf
-
Join our exclusive session where our experts will break down: ➡️ Why traditional VPNs are falling short ➡️ The importance of zero trust ➡️ How to replace VPNs with ZTNA ➡️ Best practices for implementing zero trust https://bit.ly/40fWPKe
-
Looking for a simple way to detect and stop executive impersonation and smishing threats before they infiltrate your cloud? Join Lookout and Verizon to learn how cybercriminals are gaining access to sensitive data and what you can do to stop them: https://bit.ly/3NOS3vO
-
Lookout reposted this
Cybercriminal tactics against ICS include direct threats against individuals for MFA credentials, sometimes escalating to violence if they won’t share. James Coyle, US Public Sector CTO for Lookout, warns about the increasing use of Android in critical Industrial Control Systems (ICS), such as HVAC systems, and how stealing MFA tokens from mobile devices could affect critical services like healthcare, finance, and water supply, depending on the goals of the attackers. https://lnkd.in/gMRNTR2s