Lookout Profile Banner
Lookout Profile
Lookout

@Lookout

Followers
45K
Following
2K
Media
3K
Statuses
11K

We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data.

Boston, MA
Joined August 2008
Don't wanna be here? Send us removal request.
@Lookout
Lookout
1 year
In this @helpnetsecurity article, @Lookout CEO Jim Dolce sheds light on the need to secure mobile devices to combat the growing threats targeting cloud environments.
5
1
6
@Lookout
Lookout
3 days
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action:
0
0
2
@Lookout
Lookout
1 month
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action:
0
0
0
@Lookout
Lookout
5 months
With the recent launch of Lookout’s Mobile Intelligence APIs, you will gain immediate visibility into mobile threat blind spots. These APIs can seamlessly integrate with your existing SIEM, SOAR, or XDR for elevated detection and response. Learn how:
Tweet media one
0
0
7
@Lookout
Lookout
5 months
With Lookout’s new Mobile Intelligence APIs, security teams can integrate mobile data into their broader security strategy to identify cross-platform attacks. Learn how:
0
0
1
@Lookout
Lookout
5 months
Lack of visibility lets attackers exploit your mobile security blind spot. Lookout’s new Mobile Intelligence APIs enable your security team to stream mobile threat events, audits, and device state changes into your SIEM, SOAR, EDR, or XDR. Learn how:
Tweet media one
0
0
3
@Lookout
Lookout
5 months
While #cloud storage allows for easy data sharing and collaboration, it also opens up potential vulnerabilities. Ensuring your #data remains secure requires a robust approach that combines prevention, detection, and remediation. Learn how:
Tweet media one
0
0
2
@Lookout
Lookout
6 months
You are invited to explore our interactive environment and experience mobile endpoint security built to protect against modern-day threats. Register now for the next session:
Tweet media one
0
0
1
@Lookout
Lookout
6 months
Are you able to detect Shadow IT within your organization? . Watch to learn how Lookout can help you detect & prevent shadow IT usage and reduce the risk of data breaches from advanced internet threats:
Tweet media one
0
0
1
@Lookout
Lookout
6 months
By understanding the risks of #genAI tools and proactively addressing them, organizations can take advantage of AI while safeguarding their most valuable assets — their data. Learn how:
Tweet media one
0
0
1
@Lookout
Lookout
6 months
VPNs, once the standard for remote access, are now inefficient and risky, hindering productivity and exposing organizations to threats. Learn why it's time to make the switch:
Tweet media one
0
0
1
@Lookout
Lookout
6 months
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action:
0
0
2
@Lookout
Lookout
6 months
Is your organization equipped to defend against advanced internet threats? Cloud-based SWGs have evolved to become a critical tool to safeguard businesses from these advanced attacks. Watch on-demand to learn how:
0
0
0
@Lookout
Lookout
6 months
The reliance on mobile devices for work has provided an opportunity for attackers to phish legitimate log-in credentials. Lookout protects company data by blocking #mobile #phishing attacks before they get started. Request a demo today:
0
0
0
@Lookout
Lookout
6 months
The cybersecurity landscape is changing — and fast. And that means security and IT leaders are being asked to pivot yet again. Join our upcoming webinar as our team of experts share their threat, trend, and best practice predictions for 2025:
Tweet media one
0
0
1
@Lookout
Lookout
6 months
Why would a cybercriminal pretend to be your CEO? Watch Verizon and Lookout explore the new threat trend of executive impersonation and how to protect your sensitive cloud data.
Tweet media one
0
0
1
@Lookout
Lookout
6 months
With the launch of our Smishing and Executive Impersonation Protection features for iOS and Android, admins get industry-first visibility and reporting, enabling you to identify a coordinated attack. Learn more in this overview:
0
0
2
@Lookout
Lookout
6 months
Learn how Lantum, a workforce platform for healthcare organizations, protects sensitive data, and ensures compliance with Lookout Secure Cloud Access:
Tweet media one
0
0
1
@Lookout
Lookout
6 months
Your organization is unique — your cloud security solution should be too. Join our next session to design a custom solution tailored to your business:
Tweet media one
0
0
1
@Lookout
Lookout
7 months
While genAI tools have increased productivity, they’ve also introduced new security risks — particularly when users unknowingly share sensitive information. Learn about the emerging risks of #genAI and strategies to protect your organization's data:
Tweet media one
0
1
1
@Lookout
Lookout
7 months
Do you have visibility into how where your data lives and how it's being used when it's shared with partners, contractors or vendors? Take our instant analyzer for a real time look into the effectiveness of your existing data protection solutions:
Tweet media one
0
0
1