Lookout
@Lookout
Followers
45K
Following
2K
Media
3K
Statuses
11K
We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data.
Boston, MA
Joined August 2008
In this @helpnetsecurity article, @Lookout CEO Jim Dolce sheds light on the need to secure mobile devices to combat the growing threats targeting cloud environments. https://t.co/JRvlWYxWZq
helpnetsecurity.com
Jim Dolce, CEO at Lookout, discusses securing mobile devices to mitigate escalating cloud threats, acknowledging mobile access complexities.
5
1
8
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
2
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
0
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
1
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
2
4
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
0
With the recent launch of Lookout’s Mobile Intelligence APIs, you will gain immediate visibility into mobile threat blind spots. These APIs can seamlessly integrate with your existing SIEM, SOAR, or XDR for elevated detection and response. Learn how: https://t.co/GQQUtuVnOI
0
0
7
With Lookout’s new Mobile Intelligence APIs, security teams can integrate mobile data into their broader security strategy to identify cross-platform attacks. Learn how: https://t.co/GQQUtuVnOI
0
0
1
Lack of visibility lets attackers exploit your mobile security blind spot. Lookout’s new Mobile Intelligence APIs enable your security team to stream mobile threat events, audits, and device state changes into your SIEM, SOAR, EDR, or XDR. Learn how: https://t.co/GQQUtuVnOI
0
0
3
While #cloud storage allows for easy data sharing and collaboration, it also opens up potential vulnerabilities. Ensuring your #data remains secure requires a robust approach that combines prevention, detection, and remediation. Learn how: https://t.co/VVBnaICjL7
0
0
2
You are invited to explore our interactive environment and experience mobile endpoint security built to protect against modern-day threats. Register now for the next session: https://t.co/3MneD5HDF4
0
0
1
Are you able to detect Shadow IT within your organization? Watch to learn how Lookout can help you detect & prevent shadow IT usage and reduce the risk of data breaches from advanced internet threats: https://t.co/uc9xdH6sAQ
0
0
1
By understanding the risks of #genAI tools and proactively addressing them, organizations can take advantage of AI while safeguarding their most valuable assets — their data. Learn how: https://t.co/0DCw8dRatT
0
0
1
VPNs, once the standard for remote access, are now inefficient and risky, hindering productivity and exposing organizations to threats. Learn why it's time to make the switch: https://t.co/oNe8kson1y
0
0
1
Cyber criminals send personalized text messages luring users to fake login pages — compromising credentials and stealing #data within minutes. With Lookout, you’re protected at every stage of the modern kill chain. See it in action: https://t.co/t37bdeRlM5
0
0
2
Is your organization equipped to defend against advanced internet threats? Cloud-based SWGs have evolved to become a critical tool to safeguard businesses from these advanced attacks. Watch on-demand to learn how:
fortra.com
Ensure users remain productive and protected on the web.
0
0
0
The reliance on mobile devices for work has provided an opportunity for attackers to phish legitimate log-in credentials. Lookout protects company data by blocking #mobile #phishing attacks before they get started. Request a demo today: https://t.co/jFWSNwy4Hx
0
0
0
The cybersecurity landscape is changing — and fast. And that means security and IT leaders are being asked to pivot yet again. Join our upcoming webinar as our team of experts share their threat, trend, and best practice predictions for 2025: https://t.co/BtimH7KOxb
0
0
1
Why would a cybercriminal pretend to be your CEO? Watch Verizon and Lookout explore the new threat trend of executive impersonation and how to protect your sensitive cloud data. https://t.co/2eg4IIA5qt
0
0
1
With the launch of our Smishing and Executive Impersonation Protection features for iOS and Android, admins get industry-first visibility and reporting, enabling you to identify a coordinated attack. Learn more in this overview: https://t.co/fw6oWfYuHI
0
0
2
Learn how Lantum, a workforce platform for healthcare organizations, protects sensitive data, and ensures compliance with Lookout Secure Cloud Access: https://t.co/YOTKkm0MpM
0
0
1