Likelihood to Recommend Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
Read full review Qualys Cloud Platform is well suited for organizations that need additional tools to secure and bolster their security from end to end. The automated, real-time threat protection is very quick to notify an admin of potential vulnerabilities and risks, as well as recommending quick fixes to resolve/close the gap before an incident occurs. QCP excels at portraying all of these in a single pane of glass, and find that the Qualys reports are more detailed than competitor product lines. One of our big issues with QCP is that you do have to pay for each scanner, which can quickly add up to large costs. For this reason, I would rate Qualys at a ~7 due to great features and functionality, but overall value could be better for a large organization. I would also say that QCP may make more sense for smaller organizations due to this pricing model.
Read full review Pros It emits alerts before any vulnerability found, thus avoiding damages. It has a very simple interface so it is easy to use. It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft. It runs in the background so it does not interrupt any activity. Its access is very flexible since only the internet is required to access through the application or web. Read full review It really does well at vulnerability scanning, which it is well known for. It's accuracy at finding vulnerabilities is top notch, more so than a lot of other vulnerability tools out there. In an organization/company you want this kind of accuracy at finding vulnerabilities in your network/endpoints It is very good at managing endpoints on a consistent basis, meaning you can add endpoints to Qualys and have the platform scan/track/protect for vulnerabilities on an ongoing basis, without user intervention It does really well at separating out and identifying what levels of criticality each vulnerability should fall into. This way, an organization/company can attack the more critical vulnerabilities first Read full review Cons They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction. Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it. Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide. More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective. Read full review This program is really complicated, the multiple functions that are presented to us are not very clear and in some cases, it is a matter of intuition to execute a function, it is not very informative. The interface of this program can be a real problem; for our taste, this program looks a bit messy, and the interface does not help or guide you to find the options you need. Read full review Usability I have never had any issue using the application since the UI and settings are laid out in an easy to follow way.
Read full review Again, the usability of Qualys has been a pinpoint for this entire review. It was easily the worst thing about the product and because of this, I would not recommend Qualys to anybody in my field. This should be something that Qualys strives to improve if they wish to stay in business.
Read full review Support Rating They had a support page within the WAS to report any concerns or seek help. But the UI of that is not smooth. Regardless support staff were pretty responsive and helpful. They scheduled calls to understand and address our problems. Email support is good as well.
Read full review Alternatives Considered Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution.
MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.
Read full review As described before Qualys is used to scan periodically the environment in order to check if there are some packages (Linux) or Applications (Windows) outdated, generating reports to the Service Owners, fulfilling what's is expected from us, attending all our expectations regarding the tool. That's why we'd choose Qualys to our organization.
Read full review Return on Investment Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data. Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs. Read full review Big time-saving tool vs. having to comb through several system reports which ultimately can still have you missing unapproved software. Quick snapshot via the dashboard provided a nice summary of where you're assets meet or do not meet your organization's policy requirements. Read full review ScreenShots