Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Lookout Delivers First Zero Trust Solution For Any App That Dynamically Adapts Based On Data Sensitivity And Continuous Risk Assessment Of Endpoints And Users

Lookout Equips Organisations With Granular Access Policies That Dynamically Change Based on Risk Levels of Mobile Endpoints, Users and Data

by The Gurus
September 13, 2021
in Editor's News
AT&T Cybersecurity grows SASE offering by adding Palo Alto Networks
Share on FacebookShare on Twitter

Lookout, Inc., an integrated endpoint-to-cloud security company, today announced the industry’s first Zero Trust access solution that dynamically adapts to changes in the risk levels of mobile endpoints and users as well as the sensitivity level of data. The solution is an expansion of Lookout Continuous Conditional Access (CCA), achieved by integrating the company’s Mobile Endpoint Security and Secure Access Service Edge (SASE) solutions. Lookout is the first SASE vendor to use native real-time device and user risk assessment to dynamically modify access and security policies from any mobile endpoint to any cloud or on-premises application.

 

People bypass perimeter-based security when using mobile devices and cloud apps to work from anywhere. To secure remote workers, organisations have traditionally relied on virtual private networks (VPNs), two-factor authentication and basic device security checks. The problem is these assessments are typically performed only at the time of access and are limited to whether an endpoint is managed and has antivirus enabled. Risk assessments must be performed continuously to identify new and changing app, device, network and phishing threats as well as anomalous user behavior to protect an organisation’s data based on it’s sensitivity level.

 

The Lookout Zero Trust access solution includes integrated data loss prevention (DLP) technology that provides insight into data sensitivity. By combining the risk assessment of devices and users with data sensitivity, organisations can now dynamically adapt access to protect apps and data rather than being limited to making blunt “yes” and “no” access decisions. With continuous risk assessment capabilities, data sensitivity insight and granular access policies, Lookout can dynamically modify data access with precision, such as redacting sensitive keywords, applying watermarks or encrypting the data so it is protected even when downloaded and distributed offline.

 

“With employees no longer inside office security perimeters, organisations must deploy Zero Trust-based access to safeguard their data,” says Aaron Cockerill, Chief Strategy Officer, Lookout. “In order to make smart access control decisions, organisations need better telemetry, including risk information on users, endpoints, networks and the applications they use, as well as the sensitivity of the data they access. With our Zero Trust access solution, Lookout customers have integrated access control with the ability to use all of this telemetry so that they can enable remote productivity without exposing their data to risk.”

 

With the integrated Lookout Security Platform that delivers Mobile Endpoint Security, Cloud Access Security Broker and Zero Trust Network Access solutions, Lookout CCA provides the following key benefits:

 

  • Secure endpoint to cloud productivity: Employees can use mobile devices to access cloud apps and data without putting sensitive corporate data at risk. With continuous risk assessments of endpoints, users and data, Lookout CCA provides dynamic and granular access and security policies to any application, enabling an organisation to empower remote productivity – even to unmanaged devices – while remaining in full control of its data.
  • Granular and dynamic policy enforcement: With full visibility into the endpoint and access infrastructure, Lookout CCA enables security teams to enforce  policies consistently and precisely. For example, an organisation can choose to deny download privileges and redact sensitive information when an employee uses a personal device and network it does not manage.
  • Meet compliance requirements: With continuous risk assessment of mobile endpoints, users and data, Lookout gives organisations full visibility into what’s happening across their hybrid environment. As a result, whether it’s mobile malware or risky apps, data leakage or insider threats, organisations can efficiently detect and respond, ensuring they remain compliant with corporate policies and regulations.
  • Simplify operations and reduce cost: Lookout CCA combines risk assessment, access and security technologies in a single platform. This means security teams have fewer tools to juggle and can streamline their operations to reduce costs and security gaps.
FacebookTweetLinkedIn
Tags: cybersecurityzero trust
ShareTweetShare
Previous Post

Red Canary Releases New Security Operations Platform

Next Post

Cybersecurity Investment: Supporting SME decision making

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information