Skip to main content
TrustRadius
Lookout

Lookout

Overview

What is Lookout?

Lookout, from the San Francisco-based company of the same name, is a platform offering mobile endpoint security.

Read more
Recent Reviews

TrustRadius Insights

Lookout is a versatile mobile security solution that offers a range of features to ensure the safety and protection of users' devices. …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing

Premium

$2.99

Cloud
Per Device Per Month

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Lookout + Google MDM - Full Integration Overview

YouTube

Lookout 2.0 Demo

YouTube

Quo Vagis Demo 05 - DLC Models #1, Point Lookout

YouTube

JWE Modding: Monorail Lookout Stops (Ultimate Mixed Eras 1.6 feature demo)

YouTube

PAW Patrol - My Size Lookout Tower demo with toys

YouTube

Demo of Flexilis (Now Called "Lookout") - Mobile Security Application

YouTube
Return to navigation

Product Details

What is Lookout?

Lookout Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(20)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Lookout is a versatile mobile security solution that offers a range of features to ensure the safety and protection of users' devices. With Lookout, individuals and organizations can proactively safeguard their mobile devices from various threats such as malware, viruses, and unauthorized access. The product's ability to scan for malware and monitor the file system provides peace of mind by ensuring security across all applications. Users can easily track important information from their devices, locate them on demand, and even make them 'Scream' in silent mode through the intuitive online interface. Additionally, Lookout offers remote wiping capabilities, allowing users to erase sensitive data from their devices if they are lost or stolen.

One of the standout features of Lookout is its premium backup feature, which enables users to securely back up and download contact and call data. This functionality ensures that valuable information is not lost in case of device damage or data loss. Alongside these proactive security features, Lookout provides valuable visibility into threat data from millions of mobile devices, offering 24/7 cybersecurity protection. This makes it an essential tool for individuals and organizations looking to stay ahead of potential security threats. From tracking devices and locating misplaced ones to detecting unauthorized access and providing breach reports and safe Wi-Fi alerts, Lookout simplifies device management with a single login. It is widely used by companies for its comprehensive antivirus capabilities that analyze phones for vulnerabilities like malware and prevent identity theft or data alteration. By installing Lookout, organizations can protect their devices from viruses while also gaining valuable insights into potential security risks.

Proactive cybersecurity posture: Many users have praised Lookout for its proactive cybersecurity posture, with several reviewers highlighting it as a key strength. This feature is particularly important in today's cyber landscape where advanced persistent threats are common, and even zero-day detection is often too late. The fact that Lookout can detect and prevent vulnerabilities before they cause any damage has been appreciated by users.

Global network visibility: Another aspect of Lookout that has received positive feedback from users is its global network visibility. Users believe that this level of visibility makes all the difference in effectively combating cyber threats. With a wide network reach, Lookout can provide comprehensive protection against emerging threats across different regions, giving users peace of mind.

App scanning capability: The ability of Lookout to scan apps thoroughly has been highlighted by many users as a significant advantage. In today's digital age where threat actors can trojanize apps, this feature is seen as business critical for everyone. By scanning apps for potential vulnerabilities and ensuring the security of widely-used apps, Lookout helps protect against potential risks and strengthens device security for users.

Cons:

  1. Lack of notification for device backups after premium services expire: Some users have mentioned that Lookout should improve its notification system to inform users when their device backups stop after their premium services or payment expires. This would help ensure that users are aware of any potential data loss and can take appropriate action.
  2. Limited features in the free version: According to some users, the free version of Lookout offers only basic features for personal use. Users express a desire for more advanced functionalities without having to upgrade to the premium version.
  3. Battery consumption and optimization issues: Several reviewers have noted that Lookout tends to consume a significant amount of battery power on their devices. They suggest that the app needs better optimization to minimize battery usage and improve overall performance.

Users commonly recommend the following actions for Cipher Cloud and Lookout based on their experiences:

  • Involve the Cipher Cloud team in the design phase. Working closely with the Cipher Cloud team during the design phase ensures better implementation of the tool.
  • Understand your requirements and customize post-implementation. Have a clear understanding of organizational requirements before implementing Cipher Cloud. After deployment, customize the tool to align with specific business needs.
  • Consider Lookout's free version before going premium. Try Lookout's free version to evaluate its effectiveness in protecting mobile devices, detecting malware threats, and recovering lost or stolen devices.

These recommendations highlight the importance of collaboration with vendors, customization based on individual needs, and evaluating free versions before investing in premium options.

Attribute Ratings

Reviews

(1-6 of 6)
Companies can't remove reviews or game the system. Here's why
Swapnil Pharate | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It is installed by the company on our work mobile for security reasons. It does its job of protecting our devices from viruses and identity issues. It provides a safe browsing experience with features like locating the device and system advisor. It also provides breach reports and safe wifi alerts when new wifi is detected or something happens.
  • System advisor
  • Wifi security alerts
  • Safe browsing
  • Antivirus
  • Breach and theft report
  • Free version has only basic features for personal use
Protecting personal or corporate devices from virus attacks, protecting privacy, safe browsing experience, and wifi & network security requirements. It can be used for personal devices like iPhone or Android. It can also help with locating device features for protecting devices from being stolen .it also has features to backup your phone, calls, and contacts. Overall complete package to protect your device in the online and offline world
Mike Narumiya | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It was used by the whole organization, to help track the devices. Occasionally staff might misplace a device, or have some concerns about its location. This allowed select staff to locate that device, as well tell if there was any unauthorized access. We used these devices in a healthcare arena.
  • Works well in the background and does not seem to impact device resources (power, networking, memory).
  • Easy to use.
  • Useful features, yet not overly cumbersome with features you don't plan to use.
  • Would prefer an easier mass distribution method.
  • Alerting for if updates were applied or not.
Works well for a smaller organization. May not be overly easy to support for larger organizations, or ones with complex BYOD protocols.
Jackie Bassett | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Lookout is used for proactive mobile device (endpoint) security. Everyone on our team hails from a cybersecurity background so we are very aware that a cybersecurity breach is no longer a question of "if", but when. The business problem Lookout addresses for us, is today most of the world transacts via some type of mobile device and using, as Lookout says, "40 million+" different apps. We valued that Lookout takes a proactive security posture and visibility into threat data from 100 million mobile devices within their global network that they include when they scan our devices and apps for potential threats. That's incredible cybersecurity protection for us to have 24/7 access to, right where we need it most.
  • A key strength is their proactive cybersecurity posture. That's not nearly as common as it should be, especially with the level of awareness of the scope of the problem these days.
  • Another key strength is their global network. That level of visibility makes all the difference, in today's cyber wars where, and you can quote me: "When an Advanced Persistent Threat (APT) attack is just a matter of time, when even zero day detection is too late, radically different approaches are required if we are ever to win these cyberwars." That's exactly what Lookout has done, and continues to do.
  • One of the greatest cyber risks in mobile is what every one uses - apps! Apps from Starbucks to Nordstroms to banking to the myriad of productivity tools we all use everyday to exceed our business/productivity goals. Now with the ability of threat actors to trojanized apps, those Lookout scans that don't require you to do any upgrades, and their proactive cybersecurity posture are business critical for everyone.
  • They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.
  • Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.
  • Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.
  • More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.
Best suited when a company is aware of the level of cyber threat out there, aware of the need to protect at their mobile devices and at the app level.

Ironically, it's also best suited when they are not at all aware. Why? Because that's exactly where the threat actors are! All you'd need to do is a few scans, for the unaware/or in denial, to get onboard. The ease of use you provide, and a demo of the cyberintelligence they get as a client "at no extra cost" will convert them pretty quickly.



Michelli Capecchi | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Lookout is an antivirus that we use throughout our company because we are aware that today nobody is safe from a cyber attack. That is why we keep our phones under analysis in search of any vulnerability like malware, as well as any downloaded file that may cause some alteration of the system. In this way, personal and work security is maintained, since identity theft or banking data or important files are avoided.
  • It emits alerts before any vulnerability found, thus avoiding damages.
  • It has a very simple interface so it is easy to use.
  • It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft.
  • It runs in the background so it does not interrupt any activity.
  • Its access is very flexible since only the internet is required to access through the application or web.
  • It tends to consume a lot of battery.
  • Your configuration is not very manageable.
  • Requires better optimization.
  • Many times it is updated or not but it does not issue a notification where it is indicated if said action has been carried out.
  • It is ideal for when the phone has been lost or stolen because it detects the immediate location of the phone.
  • Although it is capable of scanning at high speed, it tends to consume the battery very fast, so it has to be a big problem.
  • It is software that can have a personal or business level, and in both cases, security is maintained through its function as an antivirus.
  • If you want to make a copy of the security of personal or business information as files, this is ideal for it, as it works as a backup.
September 02, 2016

Lookout in a nutshell

Bart Martinez | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I use Lookout more on a personal level than a professional one. In all honesty other than malware scanning the backup features that Lookout provides are available for free through various other apps such as Google backup, Google photos, Samsung backup, iCloud etc. This goes the same for a device locator which is available for free from Android device manager and from Samsung and Apple. The great thing this does offer is a unified application for application security, backup, device locator and device remote wipe. For both business and personal use this simplifies your device management with a single login. The great thing is that you can still use other backup and device locator methods as well so you can have a redundant solution in place.
  • Device application security
  • Simple to use interface both on devices and on the web
  • Unified way to manage security, backups, device locator and remote wipe
  • Free solution to application secuirty
  • The only con I have is that it is a paid solution to something that can be done for free but through multiple apps
This will simplify device management for who ever does device administration. It does not get any easier than having a single login to manage multiple devices. It also allows admins to monitor if there are any un-trusted applications on the device and if any applications pose a data leak risk. For personal use I would only use the free features of Lookout to scan applications for malware and use other free services for backup and device location.
Nick Jastrebski | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Lookout is utilized for mobile security throughout our organization. It is deployed across all Android devices within the organization so we can stay ahead on mobile security. It regularly scans for malware, either scheduled or on demand when desired. Meanwhile, between scans it also monitors the file system so any files downloaded locally to a device are also checked instantaneously. Scan history is tracked and can be viewed online at any time to ensure security is universal across all applications. Malware definitions are updated regularly, so it helps secure mobile devices which often contain personal and bank information, and could be easily hacked. Aside from personal information security, Lookout also offers great flexibility for remote device monitoring. Users can track all types of important information from their device. There's a nice online feature which allows users to find their device on demand at any given time. If the device is in silent mode there is a way to make the device "Scream" through the online interface so it makes a sound even without sound currently enabled locally. It also allows for remote wiping of the device if desired. Lastly a premium feature is backing up and download all contact/call data.
  • Scanning of all device apps with up to date definitions.
  • Backing up all device related data to the cloud.
  • Finding devices.
  • Letting users know when device backups stop after premium services/payment expire.
Lookout is excellent for mobile device security. I'd recommend it to anyone looking for a simple solution to guarantee peace of mind when keeping mobile devices secure. It's also excellent for finding a device that's been lost remotely, including an excellent feature for enabling audio on a device when it was put in silent mode locally. The web UI is easy to use and allows for powerful functionality through a simple interface. Lastly, it is an excellent secondary backup solution. I'd recommend having other potential backup solutions as well in case this premium feature ever expires and you aren't sure whether you have a most recent contact backup within Lookout.
Return to navigation