Likelihood to Recommend Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
Read full review I think it's well suited as a drop-in EDR, really an XDR, I guess if you want to go there. A platform for most organizations. I think it lacks some of the granularity in off-the-shelf rule sets that I want for defense Industrial base or financial services clients. For heavily targeted organizations, I think it requires a lot more customization than some of the competitor products off the shelf. So if you get there, it's not there day one.
Read full review Pros It emits alerts before any vulnerability found, thus avoiding damages. It has a very simple interface so it is easy to use. It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft. It runs in the background so it does not interrupt any activity. Its access is very flexible since only the internet is required to access through the application or web. Read full review It integrates perfectly with Azure Sentinel. I mean, that's great. We can have a single pane of class with other platforms, like Defender for Cloud, Defender for endpoints, and Defender for servers, which is awesome as well. The ease of deployment is because Microsoft made sure around a year ago that every single workstation with Microsoft Windows came with Defender for Endpoints embedded. Read full review Cons They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction. Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it. Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide. More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective. Read full review While it's a very good product for auditing, it has a very hard time to distinguish what is malicious and is an attack, what is not. Very rarely we get indication of a real malicious attack. We got lots of hours for off the shelf malware that it cleans up automatically. So basically we never get to look at it, which is a positive thing, but threats are detected by the third party endpoint, so it will not be enough by itself. Read full review Likelihood to Renew Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
Read full review Usability I have never had any issue using the application since the UI and settings are laid out in an easy to follow way.
Read full review Support Rating The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review Alternatives Considered Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution.
MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.
Read full review I would say not to name specific company names, because I'm a partner with one of them and that's the account that I work with. But I use some competing solutions that I would say are pretty heavy from an overhead perspective with the agent that has to be installed in the machine. It can be too restrictive for permissions where it gets in the way of an employee doing their job and the ability for Defender to be secure in that, but still allow an employee to go about their day and do what they need to do is certainly a change maker there. But yeah, from the other products perspective across the years, whether it be business or personal, some other products I can name are other endpoint protections from Vera Avast, McAfee, of course as folks remember that. And some of the other major players too that I would say a large networking company that doubles in security as well. I'll name them that way.
Read full review Return on Investment Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data. Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs. Read full review Reduced incidents of security breaches lead to lower remediation costs and avoid potential financial losses and reputational damage. Reduces the need for additional third-party security solutions and training, thereby lowering overall security management costs. Increased efficiency and productivity of IT staff lead to better allocation of resources and cost savings. Reduces the risk of fines and sanctions associated with non-compliance, ensuring business continuity and protecting revenue. Read full review ScreenShots Microsoft Defender for Endpoint Screenshots