Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Critical Capabilities for Mobile Vulnerability Management

As organizations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive. Allowing employees to work productively from any device and any location can open users to the risks that come with the shared nature of a mobile device. When your employees work from a personal device with access to corporate data, the device's health must be taken into account. It must be assessed for compliance with corporate security and risk policies.

Microsoft Integration for a secure mobile workforce

The demand for secure remote worker solutions has dramatically grown and corporations are trying to provide secure access to business data while preserving user privacy on their personal devices. Leveraging the new Microsoft Endpoint Manager App Protection with Lookout capability, organizations can provide secure access to O365 and Teams apps, related data, and user credentials from a user’s personal mobile devices.

Where does mobile fit into security frameworks

Hear how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this and answered questions about how smartphones and tablets fit into your security strategy.

How to threat hunt with mobile EDR

The Lookout Security Platform includes threat hunting capabilities as part of its mobile endpoint detection and response (EDR) solution. Watch Lookout security researcher Apurva Kumar walk through how she uses the Lookout console to investigate a security incident. Learn more about how you can secure your organization with EDR here: lookout.com/products/detection-and-response

Modernizing Government Cybersecurity with Zero Trust

Lookout CEO, Jim Dolce delivered a keynote address at the recent CyberTalks conference. In a time of disruption and uncertainty, cyberattacks have been on the rise and an Executive Order was issued requiring agencies to have a plan for Zero Trust. Learn how agencies can get started on this journey, securing apps, data, and resources, regardless of where they reside. This on-demand video recap provides guidance on how to stay ahead of the complex threat landscape posed by nation-states and other adversaries.