Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout ZTNA - Intro to onboarding an application, securing access and protecting sensitive data.

In this Lookout ZTNA demo video, you will see how to onboard an application that is within your corporate network, how to secure access to the application using identity-driven policies and how to apply data protection policies to protect sensitive data.

Ransomware Attacks: How to Mitigate Risk and Protect Your Data

Ransomware is not a new threat, but the tactics that attackers are using to access corporate infrastructures and steal resources has evolved. With the continuation of remote work and data being stored on the cloud, attackers only need to compromise one user, app or device to gain access. Learn more about how these attacks happen.

2021 Prediction: Growing awareness of privacy will drive behavior change

In 2021, we predicted that the growing awareness of privacy will drive behavior change. Individuals and organizations are becoming more conscious of how data collected by mobile apps could be used with malicious intent. Burak Agca, Senior Sales Engineer, talks about what we got right, and what surprised us.

2021 Prediction: Mobile will enable ransomware

As many of us continue to stay at home, we are using our phones, tablets and Chromebooks more – both for personal and work purposes. With their small screens and multitude of messaging channels, they are a perfect vector for phishing messages aimed at stealing credentials for corporate access. Hear from Kristna Balaam, Senior Security Intelligence Researcher about what we got right, and what surprised us. See our 2022 predictions on our newest blog: bit.ly/3pS3rfb

15 Minute Friday: How a Leading University Hospital Health System Secures Patient Data with Lookout

Hear a use case of how a leading university hospital secures patient data through its journey to the cloud. In addition to cloud protection, needs quickly were realized for cloud DLP and EDRM to fully secure and keep sensitive data safe and HIPAA compliant in the cloud. In this 15 minute session, we will dive into the problem faced and how it was solved. No sales pitches, no demos, just solutions.

How Does a Secure Web Gateway (SWG) Work? | Lookout

Can a Secure Web Gateway help secure my business’ data and workforce? Secure Web Gateway (SWG) protects web surfing users by filtering malware. With a SWG, remote users send their traffic directly to the cloud where traffic processing and security policy enforcement occurs. Remote users access virtual gateways in the cloud which is then responsible for connecting the user to the desired website. Discover all the key benefits SWG can offer your business and remote employees with Lookout.