IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Lookout reveals mobile-first endpoint detection and response solution

New EDR solution looks beyond the typical malware for threats on mobile devices

Lookout logo on white background

Lookout Inc., a leader in mobile security, released the first comprehensive mobile endpoint detection and response (EDR) solution, which incorporates its Lookout Security Platform to analyze mobile threats (e.g., Pegasus, Dark Caracal, Monokle, SilkBean). Lookout EDR allows companies to do their own research and prevent data breaches.

Cybercriminals use advanced methods beyond malware and exploits to cause data breaches. Lookout protects companies against various issues, including malicious apps, app risks, vulnerabilities and phishing URLs. The combination of EDR with the Lookout Security Platform has created the “industry's first comprehensive capability to detect and respond to mobile threats in order to stop advanced attacks.” 

"This past year, we have seen organizations of all sizes and industries struggle to ensure their security protocols match with the unique needs of their remote workforce," said Phil Hochmuth, program vice president of enterprise mobility at IDC. "It is no longer sufficient to only have activity monitoring for desktop and laptop computers as mobile devices have become a primary tool employees use to stay productive away from the office."

Providing EDR for mobile endpoints differs for desktops and laptops. Lookout employs a mobile-first approach to take mobile’s constrained resources into account. It also considers end users’ privacy and supports the threat response and investigation process.

"Every employee uses a mobile device for work but most companies are not monitoring attacks on these devices. For that reason, advanced persistent threats (APTs) are increasingly attacking mobile rather than traditional endpoints or corporate infrastructure," says Aaron Cockerill, chief strategy officer at Lookout. "Mobile endpoint detection and response enables organizations to hunt for APTs by identifying the mobile component of these cyberattacks."

Related Resource

The complete guide to changing your phone system provider

Optimise your phone system for better business results

How to change your phone system provider - whitepaper from AircallDownload now

Lookout developed the platform using artificial intelligence (AI) on telemetry data from about 200 million devices and more than 120 million apps. Security analysts can research APTs and investigate incidents found by the platform to identify app and device threats, uncover risky app behavior and automatically convict malicious code.

"When EDR was first introduced for desktop and laptop devices, it provided an important tool for security teams to investigate advanced cyberattacks and prevent a data breach," says John Ramsey, chief information security officer, National Student Clearinghouse. "Mobile endpoints like smartphones, tablets and Chromebooks need the same EDR coverage, and the direction that Lookout is taking fills a critical requirement."

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022
How do you become an ethical hacker?
ethical hacking

How do you become an ethical hacker?

29 Apr 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022