Overview
What is Lookout?
Lookout, from the San Francisco-based company of the same name, is a platform offering mobile endpoint security.
Protect and secure your mobile device
Solid, easy to use device location product
Lookout for Mobile/App Cybersecurity You Can Trust Where You Need To
A reliable solution for the backup and protection of mobile phones
Lookout in a nutshell
Lookout - Personal & Enterprise Mobile Security
Pricing
Premium
$2.99
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Product Demos
Lookout + Google MDM - Full Integration Overview
Lookout 2.0 Demo
Quo Vagis Demo 05 - DLC Models #1, Point Lookout
JWE Modding: Monorail Lookout Stops (Ultimate Mixed Eras 1.6 feature demo)
PAW Patrol - My Size Lookout Tower demo with toys
Demo of Flexilis (Now Called "Lookout") - Mobile Security Application
Product Details
- About
- Tech Details
What is Lookout?
Lookout Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(20)Community Insights
- Business Problems Solved
- Pros
- Cons
- Recommendations
Lookout is a versatile mobile security solution that offers a range of features to ensure the safety and protection of users' devices. With Lookout, individuals and organizations can proactively safeguard their mobile devices from various threats such as malware, viruses, and unauthorized access. The product's ability to scan for malware and monitor the file system provides peace of mind by ensuring security across all applications. Users can easily track important information from their devices, locate them on demand, and even make them 'Scream' in silent mode through the intuitive online interface. Additionally, Lookout offers remote wiping capabilities, allowing users to erase sensitive data from their devices if they are lost or stolen.
One of the standout features of Lookout is its premium backup feature, which enables users to securely back up and download contact and call data. This functionality ensures that valuable information is not lost in case of device damage or data loss. Alongside these proactive security features, Lookout provides valuable visibility into threat data from millions of mobile devices, offering 24/7 cybersecurity protection. This makes it an essential tool for individuals and organizations looking to stay ahead of potential security threats. From tracking devices and locating misplaced ones to detecting unauthorized access and providing breach reports and safe Wi-Fi alerts, Lookout simplifies device management with a single login. It is widely used by companies for its comprehensive antivirus capabilities that analyze phones for vulnerabilities like malware and prevent identity theft or data alteration. By installing Lookout, organizations can protect their devices from viruses while also gaining valuable insights into potential security risks.
Proactive cybersecurity posture: Many users have praised Lookout for its proactive cybersecurity posture, with several reviewers highlighting it as a key strength. This feature is particularly important in today's cyber landscape where advanced persistent threats are common, and even zero-day detection is often too late. The fact that Lookout can detect and prevent vulnerabilities before they cause any damage has been appreciated by users.
Global network visibility: Another aspect of Lookout that has received positive feedback from users is its global network visibility. Users believe that this level of visibility makes all the difference in effectively combating cyber threats. With a wide network reach, Lookout can provide comprehensive protection against emerging threats across different regions, giving users peace of mind.
App scanning capability: The ability of Lookout to scan apps thoroughly has been highlighted by many users as a significant advantage. In today's digital age where threat actors can trojanize apps, this feature is seen as business critical for everyone. By scanning apps for potential vulnerabilities and ensuring the security of widely-used apps, Lookout helps protect against potential risks and strengthens device security for users.
Cons:
- Lack of notification for device backups after premium services expire: Some users have mentioned that Lookout should improve its notification system to inform users when their device backups stop after their premium services or payment expires. This would help ensure that users are aware of any potential data loss and can take appropriate action.
- Limited features in the free version: According to some users, the free version of Lookout offers only basic features for personal use. Users express a desire for more advanced functionalities without having to upgrade to the premium version.
- Battery consumption and optimization issues: Several reviewers have noted that Lookout tends to consume a significant amount of battery power on their devices. They suggest that the app needs better optimization to minimize battery usage and improve overall performance.
Users commonly recommend the following actions for Cipher Cloud and Lookout based on their experiences:
- Involve the Cipher Cloud team in the design phase. Working closely with the Cipher Cloud team during the design phase ensures better implementation of the tool.
- Understand your requirements and customize post-implementation. Have a clear understanding of organizational requirements before implementing Cipher Cloud. After deployment, customize the tool to align with specific business needs.
- Consider Lookout's free version before going premium. Try Lookout's free version to evaluate its effectiveness in protecting mobile devices, detecting malware threats, and recovering lost or stolen devices.
These recommendations highlight the importance of collaboration with vendors, customization based on individual needs, and evaluating free versions before investing in premium options.
Attribute Ratings
Reviews
(1-4 of 4)Protect and secure your mobile device
- System advisor
- Wifi security alerts
- Safe browsing
- Antivirus
- Breach and theft report
- Free version has only basic features for personal use
- Anti theft report
- Breach advisor
- System advisor
- Mobile security
- Safe browsing
- Privacy advisor
- Awareness of security and compliance
- Less overhead of protecting device
- More privacy
- Alert for data breaches
Solid, easy to use device location product
- Works well in the background and does not seem to impact device resources (power, networking, memory).
- Easy to use.
- Useful features, yet not overly cumbersome with features you don't plan to use.
- Would prefer an easier mass distribution method.
- Alerting for if updates were applied or not.
- Security is often hard to translate into ROI terms. However, having an option to locate a device does mitigate a possible large expense in fines or other issues with loss of data.
- Minimal cost/support needs, does not significantly impact support staff. So can add support without additional costs.
- lojack
- It emits alerts before any vulnerability found, thus avoiding damages.
- It has a very simple interface so it is easy to use.
- It allows the protection against vulnerabilities as well as the backup of information and search before the loss of the mobile or theft.
- It runs in the background so it does not interrupt any activity.
- Its access is very flexible since only the internet is required to access through the application or web.
- It tends to consume a lot of battery.
- Your configuration is not very manageable.
- Requires better optimization.
- Many times it is updated or not but it does not issue a notification where it is indicated if said action has been carried out.
- It is ideal for when the phone has been lost or stolen because it detects the immediate location of the phone.
- Although it is capable of scanning at high speed, it tends to consume the battery very fast, so it has to be a big problem.
- It is software that can have a personal or business level, and in both cases, security is maintained through its function as an antivirus.
- If you want to make a copy of the security of personal or business information as files, this is ideal for it, as it works as a backup.
- Business security based on mobile phones is kept safe thanks to the fact that this antivirus allows us to be aware of the state of each of them.
- It allows all the information available through mobile phones to be kept safe since it also provides a backup of it.
Lookout in a nutshell
- Device application security
- Simple to use interface both on devices and on the web
- Unified way to manage security, backups, device locator and remote wipe
- Free solution to application secuirty
- The only con I have is that it is a paid solution to something that can be done for free but through multiple apps
- Reduces the amount of time device administrators take to manage devices
- Reduces the amount of staff needed to manage devices
- Reduces the risk of a data leak from un-truseted applicaitons
- Prey and Cerberus
- Device location
- Quick view of backups
- Easy retrieval of backups
- None