Lookout enters strategic partnership with Samsung
Posted on 06 September 2013.
Lookout announced its expansion into business with a stand-alone mobile security offering for business coming later this year. Additionally, Samsung Electronics and Lookout announced a partnership to bring Lookout to mobile devices with Samsung KNOX.


“We’re excited to partner with Lookout to bring an additional level of security to Samsung KNOX. Lookout is the leader in mobile threat protection, and through attachment scanning and safe browsing they are uniquely equipped to address business mobile security and the evolving challenges in the BYOD movement,” said Dr. Injong Rhee, Senior Vice President of KNOX Business Group at Samsung Electronics.

Samsung KNOX is an end-to-end solution that provides security hardening from the hardware through to the application layer. Lookout for KNOX will include real-time, cloud-based scanning to protect against mobile threats from email attachments, web browsing, and any type of file sharing services.

“Samsung is a market leader in mobile devices for business, and we’re excited to work together to bring Lookout to KNOX,” said John Hering, CEO of Lookout. “Protection against mobile threats for devices in the workplace is critical, and we’re excited to announce we’re expanding to address the unique needs of businesses.”

Lookout’s expansion comes at a critical time. With one in three businesses allowing employees to use devices for work according to Gartner, mobile security is more important than ever. In fact, more than half of Fortune 1000 companies have employees using Lookout on their mobile devices already, and more than 45 million people worldwide use Lookout. With protection against mobile threats critical for businesses, Lookout will introduce Lookout for Business, a standalone offering, later this year.

In partnership with Samsung, the KNOX platform retains full compatibility with Android and the Google ecosystem while engineering fundamental security and management enhancements, including its unique application container technology that enables enterprises to support both BYOD and Corporate-Liable models, without compromising corporate security or employee privacy.





Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //