Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 25 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Lookout Announces Operations in Mainland China

Lookout China Connect addresses cloud connectivity challenges for China-based employees of multinational companies.

by Tara Antoni
July 12, 2023
in Featured, Features
Lookout Launches Mobile Endpoint Detection and Response for MSSPs to Help Close the Mobile Security Gap for Customers
Share on FacebookShare on Twitter

Yesterday, Lookout, Inc. announced Lookout China Connect, an extension of the Lookout Cloud Security Platform operating in mainland China. Lookout China Connect simplifies connectivity for remote workers in mainland China without the complexity of a private network, all while complying with China’s legal and regulatory requirements.

Global enterprises operating in mainland China must provide local workers with the same application access, security and overall user experience as employees elsewhere. But providing consistent connectivity isn’t easy in China. Operational issues arising from China’s unique internet landscape, including IP address blocking, bandwidth throttling and unpredictable latency, can impact productivity and day-to-day operations. In the past, the only way to address these challenges was to route traffic over a private network connection or VPN from mainland China to an international site. This can sometimes be a difficult approach because in some cases, companies are restricted from utilizing leased lines to international locations.

Lookout China Connect offers multinational companies a comprehensive strategy to navigate the connectivity challenges that arise in China’s complex regulatory environment. It also provides consistent visibility and security in a simplified SaaS-delivered solution. And because it’s based on the Lookout Cloud Security Platform, it provides the same converged protection for:

  • SaaS connectivity: Global enterprises reliant on SaaS applications, such as Microsoft 365, Salesforce, ServiceNow and others can connect and secure remote workers operating in mainland China with consistent security policies across their entire global infrastructure.
  • Remote users or teams: Remote users working from home in China can access private corporate applications and data hosted in locations outside of mainland China with the same experience and protection as their colleagues elsewhere in the world.
  • International websites: Employees operating in China are protected from accessing and being infected by malicious web traffic, websites with vulnerabilities, internet-borne viruses, malware and other cyber threats.

“Global organizations rely on secure connectivity to ensure a consistent user experience and maintain productivity — no matter where they may be,” said Sundaram Lakshmanan, Lookout CTO. “Lookout China Connect provides these organizations with a positive user experience and the peace of mind that their data is protected and accessible – regardless of device, user or location.”

 

FacebookTweetLinkedIn
ShareTweet
Previous Post

Salt Security Chosen to Protect APIs as Part of Application Modernisation at Jemena

Next Post

Users of Honeywell Experion DCS Platforms urged to patch 9 vulnerabilities immediately

Recent News

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023
The Journey to Secure Access Service Edge (SASE)

The Journey to Secure Access Service Edge (SASE)

September 22, 2023
WatchGuard

WatchGuard acquires CyGlass for AI-powered network anomaly detection

September 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information