Lookout’s new approach to cybersecurity is designed to protect businesses as their employees work from outside the corporate perimeter. With integrations to Okta, VMware and other technology partners, Lookout brings security and compliance to today’s digital workforce without compromising productivity, privacy or user experience.
Business apps and data have moved to the cloud and employees have gone mobile. For most businesses, this means their data may be accessed from devices they don’t know or trust, over unsecured Wi-Fi networks they don’t control. Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply. However, that doesn’t mean information can’t be protected. It just means a different approach is required – a post-perimeter approach.
“Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.” Bad actors are aware of this trend and are already taking advantage of it. In fact, more than half of Lookout’s Safe Browsing users have encountered a malicious link in the last year. The acceleration of BYOD (Bring Your Own Device) policies only compounds this risk, as social media and mobile messaging apps used for personal purposes can be compromised to phish employees and steal corporate data.
“In the post-perimeter model, access control mechanisms move from a single, corporate perimeter to every endpoint and user in the enterprise,” said Aaron Cockerill, Chief Strategy Officer at Lookout. “This shift has huge implications for Lookout, as we have the largest mobile endpoint footprint in the cybersecurity market today. With cloud adoption on the rise and a growing dependence on mobile technology, Lookout will play a major role in this new security paradigm.”
According to Lookout, the post-perimeter model necessitates two actions:
- Security functions must move to the endpoint, and
- A zero trust security model must be adopted to protect corporate data.
Putting the trust in zero trust
The zero trust access model is centered on the belief that organizations shouldn’t automatically trust anything, whether inside or outside their perimeter. To establish trust and gain access, users must both prove their identity and validate their device is free from cyber threats. A device that has been compromised cannot be trusted and shouldn’t be granted access.
Lookout offers enabling technologies to advance the zero trust model on the mobile endpoint, including:
- Continuous conditional access (CCA), where users must validate that their device is free from cyber threats to gain access to corporate resources.
- Phishing & content protection, which guards businesses from phishing attacks across all channels, including social media apps, messaging apps, SMS and more.
Partners and enterprises embrace the Lookout vision for a post-perimeter world
Today, products such as the VMware Workspace ONE digital workspace platform operates with identity solutions such as Okta Identity Cloud, to control authentication and access to corporate resources based upon user identity and authentication policies. As part of the Workspace ONE Trust Network, Lookout and VMware are collaborating to help provide customers with a modern approach to enterprise security.
To supplement existing Lookout integrations with Workspace ONE, Lookout’s Continuous Conditional Access now incorporates device health status in the authentication and access decisions across managed and unmanaged devices.
“Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to give employees seamless access to any application from any type of device under automated and granular policy control,” said Tony Kueh, Vice-President of product management, End User Computing, VMware.
“In addition to the inherent security capabilities built into Workspace ONE, VMware collaborates with leading security companies, including Lookout, to integrate their solutions with Workspace ONE and ultimately provide customers with a single platform to manage and better secure all devices. By integrating Lookout’s Continuous Conditional Access capabilities into Workspace ONE, we will help deliver a continuously secured digital workspace for our customers.”
“The adoption of cloud and mobile makes a network perimeter-centric view of security outdated, and companies have realized that they have to securely enable access for all users, regardless of their location, device, or network,” said Chuck Fontana, Vice President of Integrations and Strategic Partnerships at Okta.
“Enabling this Zero Trust security model requires organizations to consider both user and device trust signals before granting access, and Okta’s identity and access management platform serves as the user access control layer for thousands of organizations worldwide. As a member of the Okta Integration Network, Lookout’s Continuous Conditional Access can offer organizations a solution for critical device security context for those access decisions as a key component of modern access management.”