TrustRadius: an HG Insights company

Lookout

Score9 out of 10

20 Reviews and Ratings

What is Lookout?

Lookout, from the San Francisco-based company of the same name, is a platform offering mobile endpoint security.

Categories & Use Cases

Protect and secure your mobile device

Use Cases and Deployment Scope

It is installed by the company on our work mobile for security reasons. It does its job of protecting our devices from viruses and identity issues. It provides a safe browsing experience with features like locating the device and system advisor. It also provides breach reports and safe wifi alerts when new wifi is detected or something happens.

Pros

  • System advisor
  • Wifi security alerts
  • Safe browsing
  • Antivirus
  • Breach and theft report

Cons

  • Free version has only basic features for personal use

Most Important Features

  • Anti theft report
  • Breach advisor
  • System advisor
  • Mobile security
  • Safe browsing
  • Privacy advisor

Return on Investment

  • Awareness of security and compliance
  • Less overhead of protecting device
  • More privacy
  • Alert for data breaches

Other Software Used

ThoughtSpot, BlueJeans Meetings, Zoom

Solid, easy to use device location product

Pros

  • Works well in the background and does not seem to impact device resources (power, networking, memory).
  • Easy to use.
  • Useful features, yet not overly cumbersome with features you don't plan to use.

Cons

  • Would prefer an easier mass distribution method.
  • Alerting for if updates were applied or not.

Return on Investment

  • Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data.
  • Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs.

Alternatives Considered

lojack

Other Software Used

Absolute Data and Device Security (DDS), Citrix ShareFile, Vipre

Lookout for Mobile/App Cybersecurity You Can Trust Where You Need To

Pros

  • A key strength is their proactive cybersecurity posture. That's not nearly as common as it should be, especially with the level of awareness of the scope of the problem these days.
  • Another key strength is their global network. That level of visibility makes all the difference, in today's cyber wars where, and you can quote me: "When an Advanced Persistent Threat (APT) attack is just a matter of time, when even zero day detection is too late, radically different approaches are required if we are ever to win these cyberwars." That's exactly what Lookout has done, and continues to do.
  • One of the greatest cyber risks in mobile is what every one uses - apps! Apps from Starbucks to Nordstroms to banking to the myriad of productivity tools we all use everyday to exceed our business/productivity goals. Now with the ability of threat actors to trojanized apps, those Lookout scans that don't require you to do any upgrades, and their proactive cybersecurity posture are business critical for everyone.

Cons

  • They're the global, mobile cyber experts we trust. They're ahead of the curve already. All I could suggest is, keep going in that direction.
  • Perhaps, send out an occasional , brief update on global trends that business executives should be aware of, even when Lookout is already on it.
  • Keep it brief, with a case study where a proactive action was taken and an event was avoided. Those would be shared enterprise-wide.
  • More PR about your proactive actions would be educational for us all. NO FUD, will ever work, but seeing that there are actions we can take, even to the newest of threats will be very effective.

Return on Investment

  • It's always difficult, in cyber, to put an ROI on a "non-event". As they say, the best that can happen to a CISO's day, is that no breach happened.
  • Lookout's auto scan and auto-reporting that every app has been scanned, the number of apps and what has/has not been found gives a level of comfort, and embeds a level of alertness everyday, never to be taken for granted.
  • There has been no negative impact. I open those scans every time, in anticipation of good news but realizing there well could be news of another kind. What I am as confident as possible about, is that, if there were an issue, Lookout would have been there to see it, and take the appropriate actions.
  • In the earlier days of cybersecurity, one would have had to hire an entire team of cyber experts or outsource it to a managed cybersecurity company at a cost that might have prohibited business. Lookout has made is easier for us all to stay compliant, aware and grow.

Alternatives Considered

Symantec Advanced Threat Protection and Symantec Norton (SMB)

A reliable solution for the backup and protection of mobile phones

Pros

  • It emits alerts before any vulnerability found, thus avoiding damages.
  • It has a very simple interface so it is easy to use.
  • It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft.
  • It runs in the background so it does not interrupt any activity.
  • Its access is very flexible since only the internet is required to access through the application or web.

Cons

  • It tends to consume a lot of battery.
  • Your configuration is not very manageable.
  • Requires better optimization.
  • Many times it is updated or not but it does not issue a notification where it is indicated if said action has been carried out.

Return on Investment

  • Business security based on mobile phones is kept safe thanks to the fact that this antivirus allows us to be aware of the state of each of them.
  • It allows all the information available through mobile phones to be kept safe since it also provides a backup of it.

Other Software Used

Panda Security for Desktops, McAfee Endpoint Security, JIRA Software, Datadog

Lookout - Personal & Enterprise Mobile Security

Pros

  • Scanning of all device apps with up to date definitions.
  • Backing up all device related data to the cloud.
  • Finding devices.

Cons

  • Letting users know when device backups stop after premium services/payment expire.

Return on Investment

  • Lookout has minimized lost devices, by essentially enabling all users to find their device no matter where it may be lost. Almost all devices are recoverable with Lookout installed and an ability to get to the current location of the device. This prevents excessive replacement device costs.
  • If a device cannot be physically recovered all personal data on the device can be wiped remotely. This reduces data breach risk for a lost/stolen device.