Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Lookout’s Platform Secures the Enterprise, From Mobile Devices to Cloud Apps
Cybersecurity

How Lookout’s Platform Secures the Enterprise, From Mobile Devices to Cloud Apps

Kieron AllenBy Kieron AllenFebruary 7, 2023Updated:February 7, 20237 Mins Read
Facebook Twitter LinkedIn Email
Lookout
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

With users accessing company networks from a complex array of devices and locations, the lines between business and personal data grow more blurry by the day. Today, security strategies and tools must protect both personal devices and corporate data precisely because so many corporate systems are accessed remotely.

Lookout provides a unified security platform that safeguards everything from mobile devices to data stored in the cloud, including the connection from the device to the cloud; data within applications — on premises or in the cloud — is protected at a granular level through centralized policies.

Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.

Who Is Lookout?

Lookout began as a security company focused on protecting mobile phones. Before officially launching the company in 2007, Lookout’s founders — John Hering, Kevin Mahaffey, and James Burgess — gained visibility by demonstrating Bluetooth vulnerabilities using a custom-made BlueSniper data extraction gun.

The team even took the device to the 2007 Academy Awards, where it harvested information wirelessly, in real-time, from hundreds of celebrities’ mobile phones to highlight the weaknesses in Bluetooth technology. In 2013, after achieving $55 million in a strategic financing round led by Deutsche Telekom, the Lookout team began to expand its corporate and technology focus into enterprise security.

Lookout Chairman and CEO Jim Dolce joined the company in 2014 and set about redefining and expanding its product line as well as its target customer. Before Lookout, Dolce founded four successful tech companies. 

Alongside Dolce in the C-suite, veteran network security engineer Sundaram Lakshmanan is Lookout’s CTO and Head of Engineering for secure access service edge (SASE) products. Aaron Cockerill, former VP of Mobile Technologies at Citrix, is the company’s Chief Strategy Officer. 

In total, the company has received $432 million in venture-capital funding.

What Does Lookout Do?

Lookout has built on its foundation of mobile security technology in order to respond to the demands of businesses in an increasingly distributed operating environment where the corporate perimeter is either fluid or non-existent.

“The way we remediate if a device is under attack is less around stopping what’s happening on the mobile device, although we do that, and more around protecting the enterprise data that the mobile device can access,” Cockerill said

Lookout Chief Strategy Officer Aaron Cockerill
Lookout’s Chief Strategy Officer, Aaron Cockerill

“For example, if a user is sent a package that causes them to install surveillance ware and
Lookout was installed on the device, after detecting the threat and notifying the user, Lookout would protect the organization by stopping or restricting the access of that mobile device to corporate data,” he added.

Based on geographic location, user, device, or other trait, Lookout enables organizations to make calculated decisions according to risk. The technology isn’t binary. If, for example, a user is accessing a business system from an unknown location, customers have security controls that mean the user can still access the data they need to make timely decisions.

See the Cybersecurity Top 10 shortlist

“If you can simplify your security strategy, then you’re likely to make fewer mistakes. One of the things we do is run all of your private and cloud applications and access to the Internet through the same proxy architecture,” says Cockerill. “This means, for example, you could write a PII (personal identifiable information) policy once and that would protect the PII coming in and going out of your organization across all of those paths.”

The Lookout Cloud Security Platform enables organizations to enforce security policies and monitor endpoints from a single, centralized dashboard for administration. As a result, cybersecurity is streamlined, enabling administrators to avoid managing the complexity that arises when users access data from countless endpoints.

There are two ways to access cloud-based services the Lookout platform, Cockerill explained. The first is via proxy, where all the traffic goes through a Lookout security assessment, and the other is monitoring, via API, what’s happening in the cloud service you are accessing.

“From a proxy perspective, a forward proxy is where the device is configured to connect all the time through cloud security,” he says. “Conversely, a reverse proxy requires no configuration on the endpoint, and that’s what we do typically for unmanaged devices where you can’t direct the traffic from the device.”

If an employee is accessing a bank or conducting other personal business from a managed device, that the traffic would go through Lookout to ensure it’s safe, with the platform filtering out malicious code and monitoring for transport of any sensitive data, Cockerill said.

Lookout’s origins in the mobile workspace are an advantage today in particular, since “now we have a mobile workforce,” and the company is “used to operating in that environment.” This is one of Lookout’s key differentiators.

Chris Hughes, Acceleration Economy Analyst, CISO
Chris Hughes talks about cybersecurity at the Cloud Wars Expo

Lookout’s enterprise security platform combines security service edge (SSE) and endpoint security while providing four services: Secure Cloud Access, Secure Internet Access, Secure Private Access, and Mobile Endpoint Protection. The four services are explained in greater detail below:

  • Lookout Secure Cloud Access: this Cloud Access Security Broker (CASB) feature protects any data stored in a company’s cloud apps using application programming interface- (API-) based security and enforcing unified policies.
  • Lookout Secure Internet Access: a cloud-delivered Secure Web Gateway (SWG) that includes Firewall as a Service (FWaaS), built on zero-trust principles to protect users, underlying networks, and corporate data from internet-based threats and data leakage. 
Lookout product architecture and services chart on Centralized Management and Continuous Monitoring
Lookout’s product architecture and services
  • Lookout Secure Private Access: Enables users to connect to private apps on-premises and in the cloud securely through cloud-delivered zero trust network access (ZTNA). It provides visibility into apps and the data that flows through them so they can give users managed access to the specific apps they need to do their jobs. Unlike a VPN, Lookout Secure Private Access connects users to applications and not the network.
  • Lookout Mobile Endpoint Protection (MES): Based on data from hundreds of millions of apps and mobile devices, MES ensures organizations can stay ahead of the curve regarding the latest cyber threats that could impact personal, managed, and unmanaged iOS, Android, and Chromebook devices. It protects against phishing campaigns, malicious apps, and risky network connections.

Customers That Lookout Has Dazzled

To date, Lookout has worked with more than 500 organizations globally and secured the personal data of upwards of 200 million individuals. One significant customer Lookout has supported is the aviation giant Airbus. 

In the wake of the Covid-19 pandemic, Airbus was confronted with a new operating environment where its 100,000-plus workforce was relying more on corporate-issue iOS and Android endpoints to carry out its duties. 

Airbus
Lookout customer, Airbus

Airbus wanted a solution that enabled zero trust access and monitoring capabilities. The company deployed Lookout Mobile Endpoint Security to tackle the problem. Now, Airbus has extended its zero-trust strategy to all corporate mobile endpoints. The company has full visibility across the entirety of its mobile threat landscape, and remote employees are benefitting from Lookout’s easy-to-use security interface. 

Why Lookout Is a Top 10 Cybersecurity Company

Lookout demonstrates how a cybersecurity company can build upon its core technology expertise to address diverse threats presented from a changing business environment as well as growth in use cases including hybrid work. Lookout has been selected as a top 10 cybersecurity business enabler because:

  • Building on a mobile-first solution, Lookout has addressed the need for a dynamic approach to data protection in an environment where a “perimeter” can be a moving target
  • The company enables growth and business innovation by managing secure access to critical data assets on a granular basis
  • Its cloud-native architecture enables Lookout customers to access and manage their security profile from anywhere
  • Consolidated security features streamline cybersecurity provision, simplifying the process of protecting internal and external networks
  • A roster of major customers validate the company’s technology strength and positioning, as well as the appeal of a comprehensive approach to security spanning endpoint to cloud.

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in Lookout?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cloud Cybersecurity Cybersecurity channel data featured Lookout
Share. Facebook Twitter LinkedIn Email
Analystuser

Kieron Allen

Cloud, AI, Innovation
Cloud Wars analyst

Areas of Expertise
  • Business Apps
  • Cloud
  • Cybersecurity
  • Data
  • LinkedIn

Kieron Allen is a Cloud Wars Analyst examining innovations in, and the future impact of, the latest AI, cloud, cybersecurity, and data technology developments. In his ongoing analyses and video reports, Allen focuses on the platforms, applications, people, and ideas that will mold our digital future. After serving as the Online Editor for BBC Sky at Night Magazine and as the Editorial Assistant for BBC Focus Magazine, Kieron became a freelance journalist in 2015 where his focus on the business technology market became a key passion. Kieron partners with technology start-ups and organizations that share his interests in science, social affairs, non-profit work, fashion and the arts.

  Contact Kieron Allen ...

Related Posts

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025

ServiceNow Re-Invents CRM for End-to-End Enterprise

May 8, 2025

Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT

May 7, 2025

Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’

May 7, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise
  • Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT
  • Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’
  • With Latest Agentic AI Products, ServiceNow Embraces Third-Party Platforms, Data Sources

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.