IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Lookout reveals mobile-first endpoint detection and response solution

New EDR solution looks beyond the typical malware for threats on mobile devices

Lookout logo on white background

Lookout Inc., a leader in mobile security, released the first comprehensive mobile endpoint detection and response (EDR) solution, which incorporates its Lookout Security Platform to analyze mobile threats (e.g., Pegasus, Dark Caracal, Monokle, SilkBean). Lookout EDR allows companies to do their own research and prevent data breaches.

Cybercriminals use advanced methods beyond malware and exploits to cause data breaches. Lookout protects companies against various issues, including malicious apps, app risks, vulnerabilities and phishing URLs. The combination of EDR with the Lookout Security Platform has created the “industry's first comprehensive capability to detect and respond to mobile threats in order to stop advanced attacks.” 

"This past year, we have seen organizations of all sizes and industries struggle to ensure their security protocols match with the unique needs of their remote workforce," said Phil Hochmuth, program vice president of enterprise mobility at IDC. "It is no longer sufficient to only have activity monitoring for desktop and laptop computers as mobile devices have become a primary tool employees use to stay productive away from the office."

Providing EDR for mobile endpoints differs for desktops and laptops. Lookout employs a mobile-first approach to take mobile’s constrained resources into account. It also considers end users’ privacy and supports the threat response and investigation process.

"Every employee uses a mobile device for work but most companies are not monitoring attacks on these devices. For that reason, advanced persistent threats (APTs) are increasingly attacking mobile rather than traditional endpoints or corporate infrastructure," says Aaron Cockerill, chief strategy officer at Lookout. "Mobile endpoint detection and response enables organizations to hunt for APTs by identifying the mobile component of these cyberattacks."

Related Resource

The complete guide to changing your phone system provider

Optimise your phone system for better business results

How to change your phone system provider - whitepaper from AircallDownload now

Lookout developed the platform using artificial intelligence (AI) on telemetry data from about 200 million devices and more than 120 million apps. Security analysts can research APTs and investigate incidents found by the platform to identify app and device threats, uncover risky app behavior and automatically convict malicious code.

"When EDR was first introduced for desktop and laptop devices, it provided an important tool for security teams to investigate advanced cyberattacks and prevent a data breach," says John Ramsey, chief information security officer, National Student Clearinghouse. "Mobile endpoints like smartphones, tablets and Chromebooks need the same EDR coverage, and the direction that Lookout is taking fills a critical requirement."

Featured Resources

AI for customer service

IBM Watson Assistant solves customer problems the first time

View now

Solve cyber resilience challenges with storage solutions

Fundamental capabilities of cyber-resilient IT infrastructure

Free Download

IBM FlashSystem 5000 and 5200 for mid-market enterprises

Manage rapid data growth within limited IT budgets

Free download

Leverage automated APM to accelerate CI/CD and boost application performance

Constant change to meet fast-evolving application functionality

Free Download

Recommended

2022 IBM's Security X-Force cloud threat landscape report
Whitepaper

2022 IBM's Security X-Force cloud threat landscape report

22 Nov 2022
2022 Magic quadrant for Security Information and Event Management (SIEM)
Whitepaper

2022 Magic quadrant for Security Information and Event Management (SIEM)

22 Nov 2022
Seven realities facing SMBs as they enter a future of increased cyber threats
Whitepaper

Seven realities facing SMBs as they enter a future of increased cyber threats

21 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022
Windows users now able to run Linux apps and distros natively
Microsoft Windows

Windows users now able to run Linux apps and distros natively

24 Nov 2022