Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

11/19/2013
08:03 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lookout Rolls Out Business Mobile Security Offering

Lookout for Business includes protection against malware, Web-based threats, and data loss

San Francisco, CA -- November 19, 2013 – Lookout, a leader in technology, today launched a comprehensive business security solution designed to make mobile security and device management easy and accessible to every business and employee. Lookout for Business is the simplest way for businesses to secure all their devices from mobile threats, data loss and device loss. This launch marks Lookout's first move in delivering solutions that help secure and protect mobile devices for businesses of all sizes.

For most companies, mobile devices are the center of productivity, so protecting them against corporate data loss, malware, spyware, and loss or theft is top of mind for IT executives. In addition to launching their Lookout for Business product, today Lookout released a white paper titled "Key Business Insights For Mobile Security in a BYOD World," which reports on the results of a commissioned survey conducted by Forrester Consulting. According to the survey, 69% of IT executives report that they are very concerned about the threat of mobile malware, viruses, and spyware. Sixty percent have experienced lost or stolen phones in the past year. Seventy-two percent agree that there is a gap between current mobile security solutions and the security threats that businesses face today.

"Companies can no longer ignore the fact that employees are often carrying their most sensitive data on mobile phones," says Nushin Vaiani from Canalys, an analyst firm. "Mobile security will be a priority as IT executives seek to protect phones from a myriad of threats, and in order for IT managers to see adoption of security it needs to be something employees are willing to use."

Lookout's "Key Business Insights For Mobile Security in a BYOD World" white paper indicates that mobile security events are costing businesses time and money: 75% of IT administrators agree that BYOD has made mobile security more challenging in the workplace, and 47% reported lost productivity associated with a mobile security event. "Lookout's expansion into business comes at a critical time, and the security stakes are higher than ever," says John Hering, CEO of Lookout. "Businesses approach us every day to find out how they can get Lookout for their employees, and we look forward to providing security that we know businesses require."

Lookout's deep consumer expertise and base of 45 million customers are the foundation for an optimized security experience that maximizes employee adoption and empowers people to take self-service actions like locating their phone. Features like Lookout's Lock Cam and Signal Flare are valuable to employees while allowing businesses to maintain an additional level of security on their mobile device.

"Employees are a major part of the mobile security equation, and solutions that will be adopted and effective will be the ones with a minimal learning curve. Businesses want products that both their IT team and employees will use and love, and Lookout has taken that to heart," says Jenny Roy, Head of Lookout for Business.

Lookout for Business includes:

● Comprehensive mobile security including protection against malware, web-based threats, and data loss.

● A simple way for IT Managers to manage devices including the ability to remotely locate, lock, and wipe devices.

● A cloud-based console that provides visibility and insight into the security and management of devices.

● Employee-facing features that allow users to find and secure their phone.

Lookout for Business is now generally available to the public and can be purchased at www.lookout.com/mobile-security-for-business.

ABOUT LOOKOUT

Lookout builds security software that protects people, businesses and networks from mobile threats. With the world's largest mobile threat dataset and the power of 45 million devices, Lookout proactively prevents fraud, protects data and defends privacy. Lookout secures the mobile experience for people everywhere through Lookout Mobile Security, a consumer app, and Lookout for Business, a cloud-based business solution for device security and management. Lookout was selected as a 2013 World Economic Forum Technology Pioneer company. Lookout has offices in San Francisco and London. For more information, please visit www.lookout.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21510
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
CVE-2020-27575
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
CVE-2020-27576
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
CVE-2020-27838
PUBLISHED: 2021-03-08
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulner...
CVE-2021-21503
PUBLISHED: 2021-03-08
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.