Lookout Mobile Security

Secure Your Digital Life by Protecting your Device,
your Privacy & your Identity

Arrange Call Back Build your SOC

Mobile Security, Privacy, and Confidence with Lookout NextGen Endpoint Protection

Lookout Mobile Security is an on-device security solution providing businesses and consumers with the ability to prevent, detect and remediate against threats on your mobile and tablet devices.

How could I, or my business be at risk?

The Victim of A PHISHING ATTACK
Installing an INFECTED APPLICATION
Connecting to UNSAFE NETWORKS
Visiting an UNSAFE WEBSITE
Not keeping Devices UP-TO-DATE

Lookout

Mobile Security Benefits

Measurable deduction of risk
Understand your organisation's mobile risk at a glance with Simple Risk Status.
Post-perimeter protection
Protection from phishing attempts, network attacks and more.
Visibility into mobile incidents
Respond quickly and effectively with real-time visibility.
Securely enable mobility
Increase productivity and stay competitive with flexible mobility programs.
Privacy
by design
Privacy-control features to ensure your data and employee privacy is upheld.
Easy to deploy and maintain
Cover your entire mobile fleet from the Lookout console.

Secure your business mobiles from any kind of cyber threat

As more sensitive data is accessed by mobile devices, they are increasingly becoming a target for attackers. Lookout for Small Business identifies mobile threats targeting these primary attack vectors:

How it Works

Lookout Mobile Security provides an intuitive cloud-based admin interface which easily allows real-time visibility of any mobile risks faced by your employees. Lookout leverages a lightweight app on the mobile device to protect it, and if needed, guide the employee through simple incident remediation on the device without relying on an IT team.

Optional SLA managed service and integration with our Protect 360° Platform to consolidate your security toolsets into one view.

How it Works

Lookout Mobile Security provides an intuitive cloud-based admin interface which easily allows real-time visibility of any mobile risks faced by your employees. Lookout leverages a lightweight app on the mobile device to protect it, and if needed, guide the employee through simple incident remediation on the device without relying on an IT team.

Optional SLA managed service and integration with our Protect 360° Platform to consolidate your security toolsets into one view.

Choose your plan

Mobile Security

Lookout Premium
Lookout for Small Business
Lookout for Threats
Lookout Comprehensive

FAQ

Respecting user privacy is one of Lookout’s top priorities. When a threat is detected, details about the threat type and when it was detected on a device can be viewed by the Lookout company admin. Lookout does not allow a company to:
Use permission or location history to track a device.
View the list of apps installed on a specific device.
View personal data inside your apps.
View your photos or videos.
View text messages, contacts or call logs.
View the history of WiFi networks joined.
View general browsing history.

Read more about Lookout’s privacy protections and find our official privacy policy statement here: https://www.lookout.com/legal/privacy-policy

Privacy information is presented to each user as part of the initial Lookout for Work app activation flow and accessible from the banner at the top of the Lookout for Work application dashboard screen. Here a user can find out more about how Lookout values their and protects their privacy.

No. Lookout inspects all outbound connections made by the mobile device and installed apps at the network level at the time a user attempts to connect. What is different about this approach is that it does not rely on inspecting message content. Lookout correlates the URL and domain name being accessed against known malicious URLs and domain names identified by the Lookout Security Cloud and alerts the end user if it is malicious prior to the connection being completed. This real-time alert prevents exposure to risky content such as malicious apps or websites with known vulnerabilities. Lookout only stores URLs that have been identified as malicious and no detailed user information is collected or stored by Lookout.

Lookout for Work on Android requests the following permissions:

Permission Why it is needed
Identity, Contacts Used as part of our integration with Azure Active Directory when using Intune, so we can log-in the user and confirm they are still logged in.
Phone (status/identity), Device ID To uniquely identify a device, so we can match it up with a device imported from a Mobile Device Management (MDM) solution. We also use this permission to differentiate between one user activating the same device twice vs activating two different devices.
Photos/Media/Files To delete malware on your file system, such as an APK file or other exploits.
Storage To scan your file system for malware and detect if your device is rooted or the firmware has been tampered with.
Wi-Fi Connection Information To provide protection from network threats such as man-in-the-middle attacks.
Change Network Connectivity, Connect/Disconnect Wi-Fi To provide network protection.
Network Access To access the internet. The client needs to be able to communicate with the Lookout Security Cloud for device protection.
View Network Connections To determine if the user is on wifi or cellular and make relevant decisions if there are network attacks. We also use this permission for some more unique identifiers that help us correlate devices at the backend.

Lookout for Work on iOS requests the following permissions:

Permission Why it is needed
Location To keep the Lookout app alive in case it stops running for any reason. Location is not read nor sent from the device.
Notification To send end user threat notifications.

Lookout takes great measures to secure your personal data. We store and process your personal information on our computers in the US (Tier-4 data center facilities that maintain a SAS 70 Type II certification) and we promise not to share your personal identifiable information with anyone. Lookout protects your data by maintaining physical, electronic and procedural safeguards in compliance with applicable US federal and state regulations and we use computer safeguards such as firewalls and data encryption. Lookout enforces physical access controls to our buildings and files and restricts access to personal information to all but those employees who require it to perform their job functions. Access the Lookout privacy policy for more detail.

No. Lookout deliberately developed a cloud-based security platform to deliver continuous protection for our customers’ mobile fleets. To address data sovereignty or compliance concerns, we offer a deployment option that does not require Lookout to collect any user information (see Enabling Privacy Controls section above). When integrated with an on-premise MDM implementation, the net result is that all user data resides on-premise within MDM infrastructure. Lookout also does not share any user data with third-party security tools.

General Data Protection Regulation (GDPR) imposes new rules on the protection of EU resident information as it pertains to privacy. Lookout takes every commercially reasonable effort inclusive of recommended technical and organizational measures to comply with GDPR (Regulation (EU) 2016/679). GDPR contains requirements about how an organization should collect, store, use, and secure personal information. Lookout focuses on the following high-level requirements that align with GDPR compliance.

Companies see a marked increase in productivity and reduction of costs by allowing BYO devices. But organizations have to also maintain employee privacy and secure sensitive company data. Lookout plays a critical role as a mobile security vendor to not only protect unmanaged employee devices, but also limit the collection of personal data. Lookout provides robust privacy controls in addition to ensuring that data is protected in-transit and at-rest.

Lookout is a market leading mobile security vendor with demonstrated compliance to the ISO 27001 and FedRAMP/NIST 800-53 standards through independent third-party assessments.
FedRAMP is a highly restrictive security standard that requires a rigorous authorization and continuous monitoring processes and is a U.S. government requirement based on NIST 800-53.
ISO 27001 is a globally recognized comprehensive security standard, requiring management commitment and improvement to a security program.

When Lookout identifies a threat to a device the user will receive an alert from the Lookout for Work application. To remove the threat the user should click ‘take action’ to remove the threat. Depending on the nature of the threat the remediation action will vary. For example, you may be prompted to remove a harmful application or comparatively be automatically blocked from visiting a potentially malicious web page whilst browsing online. Once the threat is successfully remediated the Lookout for Work application will confirm the device health is clean and ‘Everything is OK’.

End users should contact their companies Lookout administrator if they are unsure what action to take or if their device is still at risk. Admins can also enforce policies which restrict users from accessing certain resources from their mobile device until a threat has been remediated and the device health is clean.

The Lookout for Work application has on average a daily battery consumption of 2-5%. Development has been applied into preserving battery life while providing the best protection possible. As the majority of Lookout intelligence and detections are driven by the Lookout Security Cloud, the mobile application itself is very lightweight and has little impact on battery consumption.

No. Lookout does not have any control over your email account. Your email account lives on servers owned by your email provider, not on your phone, and Lookout’s app security scan only scans what is on your phone. However, if you download something from an email that is either malware or spyware, Lookout's scan will detect it as a threat.

Yes. Access the ‘protections’ tab in the console and select the ‘On Device Threat Remediation’ tab at the top of the console. From here you can add a blocked domain and save. Any enrolled users will then be blocked access to that URL.

No. To keep you safe while browsing online Lookout requires its own VPN to be active. Any existing VPN on the mobile device will need to be replaced for Lookout’s phishing protection to work.

Lookout phishing & content protection, a comprehensive feature in Lookout Mobile Endpoint Security, is designed to protect from phishing attacks from any channel, including email (corporate or personal), SMS texts, messaging apps, and URLs embedded into apps.

Lookout inspects all outbound connections made by the mobile device and installed apps at the network level at the time a user attempts to connect. What is different about this approach is it does not rely on inspecting message content, and therefore does not violate end user privacy. Lookout correlates the URL being accessed against known malicious URLs identified by the Lookout Security Cloud, and alerts the end user if it is malicious prior to the connection being completed. This real-time alert prevents exposure to risky content such as malicious apps or websites with known vulnerabilities.

Using the invitation email sent to you by your company admin you can install and activate Lookout on more than one device. However this will consume an additional license purchased by your organisation so you should seek permission from your Lookout administrator first.

Though certain features are duplicated across both apps, the personal version of Lookout includes individualised and consumer focused security features such as theft alerts, locate and lock + wipe, which are not included in the Lookout for Work application.

Lookout for Work provides more complete mobile security against the entire spectrum of mobile risk with the intention to protect the company from mobile related threats and risk, across applications, web, content, network and device-based threats. It also allows a company administrator to set policies to control risk, and to view mobile threat activity across their mobile fleet.

The Lookout Personal app and Lookout for Work can run side by side on the same mobile device without causing problems, however only a single VPN connection can be active for either Safe Browsing (in Lookout Personal) or Phishing and Content Protection (in Lookout for Work) to be active at any time.

Please check your spam and trash folders if the Lookout welcome email has not arrived in your inbox. The email will be titled ‘Welcome to Lookout Mobile Security from Digicel Business - Activate now’ and will have been sent by Lookout rather than Digicel Business.

If you still can’t find your welcome email, the most likely reason is that your email address was processed incorrectly during the order process. Please email tac@digicelsupport.com to have your company admin email address checked or updated and we can resend you the Lookout welcome email.

The console can be accessed at any time by visiting https://app.lookout.com . A password reset can be initiated from here if required.

Once the enrolment invitation has been sent from the Lookout admin console, the user will receive an email to activate Lookout for Work on their iOS or Android mobile device.

Using their mobile device, the user should copy the activation code included, and click the Install Lookout for Work link in the invitation. Once they get to the app store they should download Lookout for Work and paste the activation code from their email when prompted. They will now have successfully activated Lookout for Work.

Enrolled devices will appear under the Devices tab in the Lookout console. Pending devices (invite sent, application not yet activated) can also be viewed under Enrolment > Manage Enrolment.

If the user is not receiving emails, ask them to add no-reply@lookout.com to their address book.

It is also possible to push the Lookout for Work application to your users using a Mobile Device Manager (MDM) or Unified Endpoint Manager (UEM).

Log in to your Lookout admin console and navigate to System then Settings.
Here you should have the option to select Manage admins.
Select Add new admin at the top right corner of your admin console and enter the details of the person you want to add as an admin.

This will instantly generate a welcome email and send them a request to log in to the console as an admin.

Lookout integrates with leading Mobile Device Manager (MDM), Unified Endpoint Manager (UEM) & Identity Access Manager (IAM) solutions. This integration enables an automated policy to be configured to grant or deny access to corporate resources from mobile devices based on the health status of the mobile device. Until a threat is remediated or the Lookout for Work app is installed, the user can be denied access. (Note that these integrations are not supported with the Lookout for Small Business product).

You can find the relevant configuration guides here for supported integrations. You may be required to log in to the support page with your Lookout admin credentials.

Mobiles are now the prime target for hackers and often the pass of least resistance for threat actors. Mobility usage is increasing and a mobile device typically gives a hacker access to both personal and corporate data. Phishing attacks alone on mobile alone are growing 85% on average every year.

In 2020 78% of Lookout business customers were alerted to some form of mobile threat by Lookout.

In addition 41% of Lookout users are alerted to a mobile threat within the first 90 days of use and mobile threats encounter rates are on the rise.

It’s simple and easy to use. Unlike other security apps, it will only alert a user if something isn’t quite right with your phone. 95% of remediations can be performed simply by the user themselves, meaning no increased overhead or involvement needed from IT or security teams. Lookout is installed on over 200million devices globally. This level of telemetry provides Lookout with an unrivalled visibility into mobile risk and threat detection. With more insight into mobile risk than any other mobile security provider, Digicel Business opted for Lookout as their chosen mobile security partner.

Everyone! Whether this is your first smartphone, or you know all the ins and outs of rooting your device, with everything people use their smartphone for today, and all the precious information that is stored on it, adding an extra layer of protection and security is essential. Lookout can help protect the investment you have made on a smartphone and make sure it is safe. Just one compromised device in a mobile fleet could result in a company wide data breach or wider-spread impact for an organization.

Get Started with Lookout

Contact our Team

Contact our Team