
Lookout Mobile Endpoint Security
Mobile threat defense with endpoint detection, response, and behavioral threat intelligence.

Product Overview
Lookout Mobile Endpoint Security is a Mobile Threat Defense solution delivering endpoint protection for iOS, Android, and ChromeOS devices through security intelligence analyzing telemetry from 220 million devices, 351.8 million mobile apps, and billions of web items. Unlike traditional security tools missing mobile-specific threats, Lookout provides mobile Endpoint Detection and Response enabling teams to detect mobile-targeted phishing, investigate suspicious activity, and respond before incidents escalate.
The platform operates through Lookout Security Cloud using machine learning to detect app behavior anomalies, network traffic threats, and device posture violations, having identified 484.4 million phishing and malware sites since 2019. Core capabilities include Smishing AI using Large Language Models to understand context addressing 328 percent increase in SMS phishing attacks, Mobile EDR providing real-time visibility from reconnaissance to data access, and Advanced Persistent Threat tracking attributing attacks to adversaries including Sandworm, APT41, and Scattered Spider. The platform delivers privacy-first architecture and enforces device compliance with Zero Trust policies.
Founded in 2007 by John Hering, Kevin Mahaffey, and James Burgess who demonstrated Bluetooth vulnerabilities at 2007 Academy Awards, Lookout raised $616 million achieving $1.8 billion valuation in 2020. The company acquired CipherCloud in 2021 and divested consumer business to F-Secure in 2023. Lookout protects hundreds of enterprises and government agencies, recognized as Leader in Forrester Wave for Mobile Threat Defense Solutions 2024, maintaining SOC 2 Type II and ISO 27001 certifications.
Product Details
Security Domain
Security category
Key Capabilities
Specific security problems this product solves
Key Features
Core capabilities and differentiators
Compliance & Certifications
Regulatory frameworks and security certifications
Integrations
Compatible tools and platforms
Deployment Options
Where and how this solution can be deployed
Supported Platforms
Operating systems and environments supported
Support Channels
Available support and communication options
Pricing Model
How this solution is priced
