Mobile Endpoint Threat Protection

There are three key statements enterprises must consider in order to move forward in protecting corporate resources from leakage and attack:

The perimeter has disappeared.

Legacy security technologies do not apply.

Devices cannot be trusted.

As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Post-perimeter security. 

Your perimeter has disappeared

Work has fundamentally changed. Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world. For example, employees don’t often have to connect to a VPN in order to check their work email or view/download sensitive documents on the go.

Attacks like phishing have also evolved to take advantage of the fact that perimeter security no longer applies. Corporate devices are personal now, as well. Social media apps, messaging apps, and others create an environment where employees can be phished and corporate credentials stolen through personal activities. Year-to-date in 2018, 50.8% of Lookout users with Safe Browsing turned on encountered a phishing link.

Unified Endpoint Management
Continuous Conditional Access

Move key security functions to the endpoint

First, instead of stashing endpoints behind traditional perimeter security, security itself must move to the endpoint. It doesn’t make sense to put guards in front of your castle when the castle walls don’t exist anymore. Security needs to be everywhere the data is.

Establish a zero trust access model

Even with security residing on the endpoint, the enterprise should never assume the device is innocent until proven guilty. This new world demands that all device health must be routinely checked in order to allow access to corporate data.

Protecting access to the corporate cloud, and the internet as a whole, without relying on perimeter defense is another crucial aspect of this architecture. To make this possible, some of those critical security functions must move to the endpoint. Monitoring for malicious links and websites — and preventing employees from accessing dangerous content — is a primary function that must move.

SOLUTION: How Custodian & Lookout allows you to embrace post-perimeter security

Lookout has specifically designed our platform to give enterprises a tangible way to bring post-perimeter security to their workforce.

It starts with our dataset of security telemetry from over 170 million devices worldwide and 70 million apps. This gives us an unprecedented depth of insight into the full spectrum of risk, including device, network, app, and content threats and risks. Because of this, we are able to provide enterprises with immediate visibility into potentially harmful scenarios happening on employee devices, at any given point in time.

Through Phishing and Content Protection

Traditionally, enterprises have relied on email security and gateways in the perimeter to mitigate phishing risk. While email security continues to have a place in the modern security architecture, a problem remains. As employees access data using applications beyond email from devices that do not live behind the perimeter, these technologies are no longer sufficient.

This is one of the main reasons security must move to the endpoint. Lookout Phishing and Content Protection lives on the device, monitoring for phishing attacks across many vectors including social media apps, messaging apps, SMS, and any app that makes a network connection.

Conditional Access

Live chat

Use our live chat service, we're happy to help

Call us

Speak to us: 01189 346639

Send an email

E-mail our team: