Lookout finds predatory behaviour on 300 loan apps
Lookout has discovered almost 300 loan apps that exhibit predatory behaviour, such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment.
Lookout partners with HPE Aruba to maximise data protection
"Integrating our SSE capabilities with Aruba SD-WAN simplifies management controls and provides a rich policy framework to keep sensitive data protected."
Lookout named Strong Performer in 2022 Gartner Peer Insights
Gartner has recognised Lookout as a Strong Performer in the 2022 Gartner Peer Insights Voice of the Customer for Security Service Edge (SSE).
Gartner names Lookout a Visionary in 2022 Magic Quadrant
Gartner has recognised Lookout as a Visionary in the 2022 Magic Quadrant for Security Service Edge (SSE) and one of the top three offerings in the 2022 Gartner Critical Capabilities for SSE report.
Australia worst in the world for mobile app threats
Australia is the country with the highest percentage of mobile app threats detected, according to new research.
Lookout adds security offerings with SaferPass acquisition
Lookout has acquired SaferPass, adding password management technology to its suite of security offerings and furthering its goal to provide customers with proactive protection.
Ivanti and Lookout bring zero trust security to hybrid work
Ivanti and Lookout have joined forces to help organisations accelerate cloud adoption and mature their zero trust security posture in the everywhere workplace.
Corporate data more at risk due to a mobile workforce
As if protecting an enterprise network wasn’t hard enough, now cybersecurity teams have to deal with the increasing necessity for mobility.Take this two minute survey
Phishing: It's all too easy on mobile devices
Imagine a world without mobile devices. We only need to cast our minds back a couple of decades to conjure up an image; but in 2018 that world is almost unthinkable.
Why endpoint security is critical in a post-perimeter era
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.