Intelligent CISO Issue 13 | Page 58

Lookout joins Google Cloud’s BeyondCorp Alliance for visibility Lookout is also a Google Cloud Technology Partner and earlier this year, Lookout announced the launch of the Post-Perimeter Security Alliance with Google Cloud and other members to address a pressing challenge for enterprises: how to integrate security capabilities across endpoint, cloud and identity to protect access to corporate data while enabling productivity. Today, organisations are adopting formal mobility programmes as a way to empower employee productivity and Google’s Cloud Identity has become one of the main ways for employees to access enterprise applications from mobile devices. Lookout and Cloud Identity help ensure: ookout, a leader in securing the post-perimeter world, has announced that it has joined Google Cloud’s BeyondCorp Alliance as one of the only mobile threat defence vendors, giving organisations the ability to dynamically monitor the health of an endpoint connected to the enterprise and feed that data to Google Cloud’s context-aware access engine. L Lookout, alongside Google’s Cloud Identity, ensures only trusted mobile devices are accessing enterprise data and apps via Cloud Identity. “To secure the cloud-first, mobile-first world, enterprises need to adopt a post- perimeter solution that includes endpoint protection, secure access to the cloud as well as identity and access management (IAM),” said Marc Jaffan, Vice President, Business and Corporate Development at Lookout. “By joining the BeyondCorp 58 To secure the cloud- first, mobile-first world, enterprises need to adopt a post- perimeter solution. Alliance, Lookout securely enables mobile productivity for Google’s Cloud Identity, G Suite and Google Cloud Platform customers, and furthers our vision to provide security and productivity for the modern, perimeter-less, cloud-delivered and privacy-focused world.” • Device health: Together, Lookout and Cloud Identity help verify that a device is healthy enough to access applications and single sign-on (SSO) platforms • Automated detection and remediation: Lookout provides device health information (for example, if the device has an app that violates security policy) to Cloud Identity and admin can then take appropriate remediation action. This includes the ability to block access to G Suite and other enterprise apps on unmanaged devices based on Lookout risk status • Threat visibility: Enterprises have full visibility into out-of-date operating systems, as well as into risky device configurations and jailbreak/root detections • Phishing protection: With Lookout, Cloud Identity customers can monitor and block mobile attempts from web and content-based threats. u Issue 13 | www.intelligentciso.com