32 Reviews and Ratings
20 Reviews and Ratings
No answers on this topic
This product is well suited for any healthcare organization, especially one privately owned by the providers. Many of our providers were displeased with our efforts to use a product that forced sandboxing of Exchange information. Therefore, we needed something that was flexible enough that sandboxing could be used where desired but still allowed native OS integration where necessary.Incentivized
Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.Incentivized
It has efficient security control system. Easy to use and administer.It is very easy to install, it connects well with with other apps.SecureWeb Xenmobile provides secured access to the websites and eliminates the need of VPN.It connects very well with other apps.Incentivized
It emits alerts before any vulnerability found, thus avoiding damages.It has a very simple interface so it is easy to use.It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft.It runs in the background so it does not interrupt any activity.Its access is very flexible since only the internet is required to access through the application or web.Incentivized
issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done.user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDFif the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update.Incentivized
They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.Incentivized
The software's usability is what we expected. We knew what our organization needed and Citrix was able to meet our needs. The ability to have the apps on a mobile device has been a great plus and Citrix seems to have really developed a software based on the every day needs of the user.
I have never had any issue using the application since the UI and settings are laid out in an easy to follow way.Incentivized
Overall the support from the customer service team has been good. They are very timely and expert in resolving the tickets. They have appropriate knowledge to resolve issues in all stages to development. They were up to the point during the implementation stage of the XenMobile, all queries were answered in time to help finish the deployment. The support for last three years has been extraordinary in helping us use XenMobile effectively and efficiently.Incentivized
With a zero trust solution for the entire digital workspace, you can continually monitor and assess session activities before, during, and after login. Reduce risk, gain more control over every session, and get deeper insights across your entire application landscape. To achieve this strong security posture across all environments, you need an application delivery solution that shares a common code base. This lets you implement consistent security policies across all your applications for comprehensive protection.Incentivized
Lookout was chosen by T-Mobile, Sprint, and AT&T which many employees have chosen as their mobile network provider. From that standpoint, it made it a simple decision. Its cloud based technology gives insight across almost all mobile code in the world. Lookout identifies connections that would otherwise go unseen without deep investigation. It helps prevent cybercriminals from sneaking into mobile devices and that's the key component for any mobile security solution. MobileIron and other competitor solutions have a similar offering, but based on network provider support I haven't need to look into the competition extensively.Incentivized
Specific ROI was on us avoiding purchasing company managed cell phones - one of the most important driversMakes on boarding, and especially offboarding remote users a heck of a lot easier w/the ability to wipe the container, even if not connected (via time setting)Easy access to internal resources - no need for separate vpn, etc...Incentivized
Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data.Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs.Incentivized