Whitepaper

Why Mobile Security

The five questions every security professional needs to ask themselves about securing mobile devices in the modern organization.

The five questions every security professional needs to ask themselves about securing mobile devices in the modern organization.

Video

Video – Mobile Threat Protection

Watch a four-minute video showcasing Lookout Mobile Threat Protection, including the lightweight endpoint apps, admin dashboard and simple provisioning.

Watch a four-minute video showcasing Lookout Mobile Threat Protection, including the lightweight endpoint apps, admin dashboard and simple provisioning.

Whitepaper

State of Enterprise Mobile Threats

This report examines enterprise security threats for iOS and Android, including vulnerabilities across apps, OS, and jailbreak vectors.

This report examines enterprise security threats for iOS and Android, including vulnerabilities across apps, OS, and jailbreak vectors.

Whitepaper

The Lookout Security Platform

Learn how the Lookout Security Platform uses global context and machine intelligence to predict mobile threats before they do harm.

Learn how the Lookout Security Platform uses global context and machine intelligence to predict mobile threats before they do harm.

Whitepaper

MalApp.D: How Lookout's Predictive Security Unmasked a Mobile Threat

Lookout's predictive security approach enabled detection of this threat, which put enterprise data at risk.

Lookout's predictive security approach enabled detection of this threat, which put enterprise data at risk.

Datasheet

Mobile Threat Protection

Lookout Mobile Threat Protection is a security solution for your mobile workforce to view and defeat evolving mobile threats.

Lookout Mobile Threat Protection is a security solution for your mobile workforce to view and defeat evolving mobile threats.

Video

Video – Why Mobile Security

Lookout VP of Products Aaron Cockerill discusses today's top enterprise concerns around mobile security.

Lookout VP of Products Aaron Cockerill discusses today's top enterprise concerns around mobile security.

Whitepaper

2015 Cybersecurity Predictions

Our co-founders John Hering and Kevin Mahaffey have put together a list of our predictions, the way we see the mobile security industry moving in detail.

Our co-founders John Hering and Kevin Mahaffey have put together a list of our predictions, the way we see the mobile security industry moving in detail.

Whitepaper

NotCompatible.C: A Sophisticated Mobile Threat

Our investigation, shows the possibility that a threat like NotCompatible.C could expand to assist in attacks on corporate networks.

Our investigation, shows the possibility that a threat like NotCompatible.C could expand to assist in attacks on corporate networks.

Whitepaper

iOS App Sideloading Security

In this whitepaper, we examine the nature and risk of sideloaded apps, and the need for enterprise visibility into this threat vector.

In this whitepaper, we examine the nature and risk of sideloaded apps, and the need for enterprise visibility into this threat vector.

Datasheet

App Intel & Vetting API

Lookout's App Intelligence & Vetting API enables seamless integration of mobile app intelligence into your systems.

Lookout's App Intelligence & Vetting API enables seamless integration of mobile app intelligence into your systems.

Whitepaper

Key Business Insights For Mobile Security in a BYOD World

Lookout, in partnership with Forrester Research, conducted a survey of IT managers that found big security concerns related to mobile devices.

Lookout, in partnership with Forrester Research, conducted a survey of IT managers that found big security concerns related to mobile devices.

Datasheet

Mobile Intelligence Center

Lookout's Mobile Intelligence Center accelerates mobile threat investigations with real-time access to the world’s largest mobile dataset.

Lookout's Mobile Intelligence Center accelerates mobile threat investigations with real-time access to the world’s largest mobile dataset.

Whitepaper

2014 Mobile Threat Report

2014 was a year of new threats, monetization strategies, and distribution methods.

2014 was a year of new threats, monetization strategies, and distribution methods.

Whitepaper

AndroRATIntern

AndroRATIntern is a new, Android surveillanceware threat discovered by Lookout that captures a wide range of sensitive data from infected devices.

AndroRATIntern is a new, Android surveillanceware threat discovered by Lookout that captures a wide range of sensitive data from infected devices.

Whitepaper

Managing Jailbreak Threats on iOS

This whitepaper provides an overview of the jailbreaking process and its security risks and highlights Lookout’s unique and innovative approach to managing this security threat on iOS devices.

This whitepaper provides an overview of the jailbreaking process and its security risks and highlights Lookout’s unique and innovative approach to managing this security threat on iOS devices.

Whitepaper

State of Federal BYOD Report

In this report we examine more surprising mobile device trends among federal employees, the risks to sensitive data, and how progressive agencies are mitigating these risks today.

In this report we examine more surprising mobile device trends among federal employees, the risks to sensitive data, and how progressive agencies are mitigating these risks today.

Datasheet

Lookout and Enterprise Mobility Management

Organizations are increasingly adopting formal mobility programs to empower mobile productivity. Coupling an enterprise mobile management solution with a cloud-based, predictive security solution provides the defensive layers needed to protect your enterprise data.

Organizations are increasingly adopting formal mobility programs to empower mobile productivity. Coupling an enterprise mobile management solution with a cloud-based, predictive security solution provides the defensive layers needed to protect your enterprise data.

Whitepaper

IDG Whitepaper: IT Leaders Buying into Mobile Security

Mobility is exploding. Businesses fully expect to work anywhere, any time, from any device. While this presents organizations with an attractive means of empowering flexibility and productivity, new security risks are also on the rise.

Mobility is exploding. Businesses fully expect to work anywhere, any time, from any device. While this presents organizations with an attractive means of empowering flexibility and productivity, new security risks are also on the rise.

Datasheet

Data Collection & Privacy FAQ

Lookout Mobile Threat Protection’s data collection facts and privacy control feature details.

Lookout Mobile Threat Protection’s data collection facts and privacy control feature details.

Analyst Report

On the Radar: Lookout addresses mobile threat protection

This report details global analyst firm Ovum's view on the “urgent need for protection systems” to secure enterprise mobile devices.

This report details global analyst firm Ovum's view on the “urgent need for protection systems” to secure enterprise mobile devices.