Why would a cybercriminal pretend to be your CEO? Watch Verizon and Lookout explore the new threat trend of executive impersonation and how to protect your sensitive cloud data. https://bit.ly/4fb1r9q
Lookout
Computer and Network Security
Boston, Massachusetts 63,682 followers
We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data.
About us
Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real time. The Lookout Cloud Security Platform is purpose-built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final cloud data extraction. We are trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and securely. Headquartered in Boston, Lookout has offices in Amsterdam, London, Sydney, Tokyo, Toronto and Washington, D.C.
- Website
-
https://www.lookout.com
External link for Lookout
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Boston, Massachusetts
- Type
- Privately Held
- Founded
- 2007
- Specialties
- mobile, security, cybersecurity, enterprise security, enterprise mobile security, byod, CASB, ZTNA, data security, #SSE, threat intelligence, mobile threat defense, and Security Service Edge
Locations
-
Primary
3 Center Plaza
suite 330
Boston, Massachusetts 02108, US
Employees at Lookout
-
Bill Willcox
Software Engineer | Embedded | TCP/IP Networking | Architect | Tech Lead | Concept to Deployment | Full Stack
-
Jean Christophe Prudhomme
Regional Channel Manager South Europe at Lookout
-
Simon Holland
Endpoint to Cloud Security
-
Jeremy Sears
Senior Principal Software Engineer at Lookout
Updates
-
While genAI tools have increased productivity, they’ve also introduced new security risks — particularly when users unknowingly share sensitive information. Learn about the emerging risks of #genAI and strategies to protect your organization's data: https://bit.ly/3OgN6w5
-
Cloud-based Secure Web Gateways (SWG) have evolved to become a critical tool to safeguard businesses from advanced attacks. Here's why you need a modern solution: https://bit.ly/3XQp1Sj
-
Do you have visibility into how where your data lives and how it's being used when it's shared with partners, contractors or vendors? Take our instant analyzer for a real time look into the effectiveness of your existing data protection solutions: https://bit.ly/3T2i1j5
-
Your sensitive #data is shared with various internal teams and external partners and vendors. Do you have visibility into this data to classify and protect it? Our instant analyzer will give you a real time assessment of your data protection effectiveness: https://bit.ly/3T2i1j5
-
Download our report to learn what else 100 of your IT & security peers said about their vulnerabilities, priorities, and strategy to data security in the cloud: https://bit.ly/3MT4S7Z
-
Lookout Secure Internet Access is a cloud-delivered secure web gateway (SWG) that protects users, networks, and corporate data from internet-based threats. It inspects all incoming and outgoing web traffic for malicious content and sensitive information. Learn how it works and how it can protect your data no matter where it goes.
-
What can IT and security professionals do now to prepare for emerging cybersecurity threats? Join us on January 15th as our panel of experts discusses the challenges, opportunities, and trends today’s security leaders need to be on their radar in 2025: https://bit.ly/4gvs0WR
-
CISA emphasizes the importance of proactive mobile threat management for those at greater risk in the Mobile Communications Best Practice Guidance: http://bit.ly/3VJpLr7 Learn more insights and trends in the Lookout Q3 Mobile Threat Landscape Report: 🔍 Advanced persistent threat (APT) groups like EagleMsgSpy and others are leveraging novel surveillanceware. 🎯 Targets: High-value individuals & organizations. 📊 Proactive tips: Understand IOCs and adapt your defenses. Stay ahead of these evolving threats: Read the full report: https://bit.ly/3VM3RU7 #Cybersecurity #ThreatHunting #MobileSecurity
-
⚠️ Is your data protected regardless of where it goes? Identify security gaps that may expose your data with Lookout's Cybersecurity Analyzer. Take the test now! https://bit.ly/3T2i1j5 #CyberSecurity #DataProtection #RiskAssessment