Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lookout

Lookout Obtains FedRAMP JAB P-ATO for SASE: What It Means for You

While the pandemic brought on unprecedented challenges related to full-scale telework, it has also moved cybersecurity to the top of the U.S. government’s agenda. I have been very encouraged by the various actions taken by the Biden administration, beginning with the May 2021 executive order directing federal agencies to rapidly adopt a Zero Trust architecture.

Lookout Named a Visionary in First 2022 Gartner Magic Quadrant for Security Service Edge (SSE)

I am excited to share that Lookout has been named a Visionary in the 2022 Gartner Magic Quadrant for Security Service Edge (SSE). We believe our strong position in the “Completeness of Vision” axis demonstrates the alignment of the Lookout Platform with the market direction. This achievement would not have been possible without the hard work and passion of the entire Lookout family who have embraced the opportunity to support our customers on their digital transformation journey.

Breaking the Chain: Are You the Unintended Victim of a Supply Chain Attack?

We’ve heard a lot about “supply chains” of various industries over the past couple of years, and the cybersecurity sector is no exception. When Colonial Pipeline was compromised by ransomware, it affected the physical supply of gasoline to consumers. On the software side, malware distributed through a SolarWinds update and vulnerabilities discovered in Apache’s Log4J created rippling effects for organizations around the world.

Cloud Transformation: Leveraging Existing IT Investments

Digital transformation has forever changed the way healthcare organizations deliver care. By pivoting to cloud based platforms, health systems can liberate data from silos and connect it in ways that enable them to gain insights, take action and collaborate across a patient’s care journey.

Zero Trust for State and Local Government

The cybersecurity threat landscape is shifting rapidly. More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time. Those are only the publicly reported instances – the actual number is likely exponentially higher, and these attacks are growing increasingly sophisticated. Meanwhile, high-profile threats to dams, electrical grids and other facilities, including the Colonial Pipeline attack this year, have shown the vulnerability of America’s critical infrastructure.

How federal agencies can revamp their mobile security posture

Cybersecurity is an increasing concern for the federal government, particularly with a larger remote workforce to manage than in the past. Changes in the distributed nature of IT networks make it even more critical to stay ahead of newer threats like ransomware and spyware. Lookout’s Vice President for Public Sector Tony D’Angelo, in a new CyberScoop interview, highlights the importance of reprioritizing mobile device security to establish a more secure network security posture. D’Angelo explains how mobile threat defense solutions help security leaders safeguard sensitive enterprise data from cyberthreats that exploit users, apps and devices. He also highlights endpoint detection and response strategies that elevate mobile security when implementing a zero-trust architecture. Watch the full interview with Tony D’Angelo and learn more about reprioritizing mobile device security to establish a more secure network security posture.

Preventing Data Exfiltration from SAP SuccessFactors

In this video, we will show you Lookout CASB can help your IT security team prevent sensitive data from being exfiltrated from SAP SuccessFactors. We do this by detecting sensitive data using data loss prevention (DLP) and encrypting data upon download with Enterprise Digital Rights Management (EDRM). This ensure your data remains both inside and outside your organization.

Preventing Insider Threats in SAP SuccessFactors

In this video, we will show you how Lookout CASB provides you visibility into insider threats and privileged user activities. By using deep application awareness and intelligence, Lookout can detect various activities such as edits, exports, and other activities. We then surface this information in user-friendly and intuitive dashboards.