▾ G11 Media Network: | ChannelCity | ImpresaCity | SecurityOpenLab | Italian Channel Awards | Italian Project Awards | Italian Security Awards | ...
InnovationOpenLab

Lookout Launches Mobile Intelligence APIs to Increase Visibility and Provide Utility to Critical Mobile Security Data

Lookout, Inc., the data-centric mobile endpoint and cloud security company, today announced their new Lookout Mobile Intelligence Application Programming Interfaces (APIs), exponentially expanding the...

Business Wire

New Product Advancements Allow Security Teams to Integrate Critical Mobile Security Data into Their Existing Security Tools to Assess Risks, Identify Attacks, and Protect Against the Modern Kill Chain

BOSTON: Lookout, Inc., the data-centric mobile endpoint and cloud security company, today announced their new Lookout Mobile Intelligence Application Programming Interfaces (APIs), exponentially expanding the scope of visibility into enterprise mobile security data. Lookout Mobile Intelligence APIs integrate critical security data from mobile devices into the solutions already in use by security teams - those like SIEM, SOAR, and XDR. This enables security teams to identify cross-platform attacks, risky trends or abnormalities, and potential risks.

Mobile devices have become the cornerstone of modern organizations, allowing employees to complete their work and access the sensitive data they need with flexibility and accessibility. However, mobile devices have also become a ripe target for threat actors attempting to compromise sensitive corporate data through the modern kill chain. To protect against this imminent threat, Lookout Mobile Intelligence APIs give security teams visibility into what’s going on with their mobile fleet to protect against account compromise due to social engineering, potential data leaks due to vulnerable apps and device takeovers due to out of date operating systems.

“Enterprise security teams must have the utmost visibility across all endpoints to ensure their organizations are fully protected, but the SIEM, SOAR, and XDR solutions they rely on to do that are only as effective as the data within them,” said Firas Azmeh, President, Mobile Endpoint Security, Lookout. “Lookout Mobile Intelligence APIs elevate the critical security data that exists in mobile environments, so organizations can get the most out of their existing SIEM and XDR investments and security teams can stay ahead of modern attackers.”

The integrations available through Lookout Mobile Intelligence APIs work both ways, meaning that Lookout not only provides an immense amount of insight into an organization’s mobile fleet, but can also accept inbound policies that security teams may have applied to other endpoints, allowing them to standardize across the organization. While mobile environments differ significantly from conventional endpoints, the Lookout Mobile Intelligence APIs deliver a wealth of data about a customer's unique and specific environment so they can make well-informed decisions on how to keep that data secure.

Additional capabilities include:

  • Detailed streaming of:
    • Administrative audit events, like who at the organization made changes to the environment
    • Device state change events, like newly registered and risk changes
    • Threat events, as they occur
    • Smishing and Executive impersonation alerts, as they happen
  • The ability to review the state of their mobile fleet by:
    • Generating lists of devices that meet certain criteria
    • Retrieving specific device details, if for example a device is still showing as high risk
    • Identifying the versions of iOS and Android Security Patch levels in their environment
    • Identifying the CVEs associated with a given OS or ASPL or even specific devices
  • Make use of third party threat data by ingesting lists of domains that devices should be prevented from connecting to, allowing a security team to normalize web protection across all platforms.

Additional Resources:

About Lookout

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real-time. The Lookout Cloud Security Platform is purpose-built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final cloud data extraction. We are trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and securely. To learn more, visit www.lookout.com and follow Lookout on our blog, LinkedIn and X.

© 2024 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® and the Lookout multi-color/multi-shaded Wingspan Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, and the 4 Bar Shield Design.

Fonte: Business Wire

If you liked this article and want to stay up to date with news from InnovationOpenLab.com subscribe to ours Free newsletter.

Related news

Last News

RSA at Cybertech Europe 2024

Alaa Abdul Nabi, Vice President, Sales International at RSA presents the innovations the vendor brings to Cybertech as part of a passwordless vision for…

Italian Security Awards 2024: G11 Media honours the best of Italian cybersecurity

G11 Media's SecurityOpenLab magazine rewards excellence in cybersecurity: the best vendors based on user votes

How Austria is making its AI ecosystem grow

Always keeping an European perspective, Austria has developed a thriving AI ecosystem that now can attract talents and companies from other countries

Sparkle and Telsy test Quantum Key Distribution in practice

Successfully completing a Proof of Concept implementation in Athens, the two Italian companies prove that QKD can be easily implemented also in pre-existing…

Most read

InVeris Combines Virtual and Live Fire Training with Launch of fats® LIVE

A new era of training for advanced human performance has arrived. Today InVeris announces the launch of fats® LIVE, an innovative new hybrid training…

CORRECTING and REPLACING Mitsubishi Electric Automotive America Unveils…

#AWS--A multimedia asset accompanying this release dated January 7, 2025 has been removed. The release reads: MITSUBISHI ELECTRIC AUTOMOTIVE AMERICA UNVEILS…

o9 Announces that the First of Its GenAI Pilot Programs is Now in Production…

o9, a leading enterprise AI software platform provider for transforming planning and decision-making, today announced that one of its first GenAI pilot…

Burkhan World Investments Celebrates TSMC’s Stellar Earnings and Underpins…

Burkhan World Investments (BWI), a leading global investment firm, congratulates Taiwan Semiconductor Manufacturing Company (TSMC) on its remarkable Q4…

Newsletter signup

Join our mailing list to get weekly updates delivered to your inbox.

Sign me up!