Cylance® and Lookout® protect enterprise endpoints in today’s perimeter-less, cloud-delivered, and privacy-focused world.
The rapid rise of a device-first workforce and sophisticated attacks that take advantage of this perimeter-less world has accelerated demand for a new security architecture and partner ecosystem that connects all aspects of endpoint protection.
As noted in the 2018 Ponemon Institute Report, one global megatrend in cybersecurity over the next three years requires companies to improve collaboration and reduce the complexity of business and IT operations. One way to do this is to have both the Lookout Mobile Endpoint Security and Cylance’s integrated threat prevention solutions. By doing so, customers extend their endpoint security policy and threat intelligence solution across all endpoints — PC, desktop and mobile — to reduce risk and meet compliance requirements.
Cylance offers an integrated threat prevention solution called CylancePROTECT® that secures sensitive corporate data with the power of artificial intelligence (AI). To date, it has been deployed by more than 3,400 forward-thinking customers, securing 14.5 million Windows, Mac, and Linux servers, desktops, and laptops. Together with Cylance’s Endpoint Detect and Response (EDR) product, CylanceOPTICS™, their unique AI-driven approach provides customers with the visibility they need into their threat landscape.
By providing that visibility, Cylance reduces the amount of resources needed. With Cylance, IT departments no longer have to take whole networks offline when they perceive a threat. Instead, the AI quarantines files it identified as threats, allowing security professionals to review individual files without taking devices or entire networks offline. Cylance’s data-driven approach both protects corporations’ data and improves IT productivity.
DBIR 2018: “As mobile devices often provide privileged access to the enterprise environment and hold two-factor authentication credentials, these classes of malware and device-based attacks can result in more damage than adware or click fraud.”
Similar to Cylance, the Lookout data-driven approach protects organizations from mobile threats and increases employee productivity. With visibility into over 170 million mobile devices worldwide, powered by intelligence from over 70 million iOS and Android apps, the Lookout Security Cloud provides visibility into the entire spectrum of mobile risk.
This visibility is increasingly becoming more important, as more employees use their smartphones to do work, access, and store sensitive data. This change necessitates a new security architecture, a concept we call “Post-Perimeter Security.” The Lookout platform gives enterprises a tangible way to bring Post-Perimeter Security to their workforce.
In today’s Post-Perimeter Security world, organizations need protection from threats targeting all endpoints. When customers have both Lookout and Cylance securing their enterprise, they gain:
Together, Cylance and Lookout protect customers from a full spectrum of threats. When enterprises add Lookout to their Cylance-secured environment, they enable their workforce to securely work from any device or any network. Lookout brings security and compliance to today’s digital workforce without compromising productivity, privacy, or user experience.